General

  • Target

    0f00c2e074c6284c556040012ef23357853ccac4ad1373d1dea683562dc24bca

  • Size

    611KB

  • Sample

    240925-ykzvpavarp

  • MD5

    349456ecaa1380a142f15810a8260378

  • SHA1

    02dd15ecdeedefd7a2f82ba0df38703a74489af3

  • SHA256

    0f00c2e074c6284c556040012ef23357853ccac4ad1373d1dea683562dc24bca

  • SHA512

    85d5dad44636f240be2943bc1e2ea0196af08ee778c4ebe055c237dffdc291ee34c4eedafc70d0c6dc6d8cdf2c48d1e296cf65c6bcbaa37e59fa276773961f0c

  • SSDEEP

    12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrIT6yF8EEP4UlUuTh1Au:FBXmkN/+Fhu/Qo4h9L+zNNIBVEBl/91l

Malware Config

Extracted

Family

xorddos

C2

http://aaa.dsaj2a.org/config.rar

ww.dnstells.com:53

ww.gzcfr5axf6.com:53

ww.gzcfr5axf7.com:53

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      0f00c2e074c6284c556040012ef23357853ccac4ad1373d1dea683562dc24bca

    • Size

      611KB

    • MD5

      349456ecaa1380a142f15810a8260378

    • SHA1

      02dd15ecdeedefd7a2f82ba0df38703a74489af3

    • SHA256

      0f00c2e074c6284c556040012ef23357853ccac4ad1373d1dea683562dc24bca

    • SHA512

      85d5dad44636f240be2943bc1e2ea0196af08ee778c4ebe055c237dffdc291ee34c4eedafc70d0c6dc6d8cdf2c48d1e296cf65c6bcbaa37e59fa276773961f0c

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrIT6yF8EEP4UlUuTh1Au:FBXmkN/+Fhu/Qo4h9L+zNNIBVEBl/91l

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Executes dropped EXE

    • Reads EFI boot settings

      Reads EFI boot settings from the efivars filesystem, may contain security secrets or sensitive data.

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates active TCP sockets

      Gets active TCP sockets from /proc virtual filesystem.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks