General

  • Target

    ab345e737a5361eff25a154296b9f909_

  • Size

    596KB

  • Sample

    241128-mll5favkhx

  • MD5

    87f51da6ac1c718aab74c39bb32ba7de

  • SHA1

    37b5749ff70ae8fcbb26a5bb7e99363432e1c368

  • SHA256

    84ab5a1714d831d74bbc16ece2083bf01b9d1f4c2e2196ae96347e36e56ee640

  • SHA512

    373821064abb6038b258e3680fe50f45816061f62c40c7deb4718c42a86dacf7fccaa6eb4c01ae26e4f3fd1aa50cc4632cefa0082334ccec9e97a99d42837b0d

  • SSDEEP

    12288:0PTJS+naeW9kclFEcMWbHdxZ7GkR2fV/6y9P/YAh7Dxu9hc7L:UTJfrW99q4bHdxZ7G1fVFND4XcP

Malware Config

Extracted

Family

xorddos

C2

dns-google.org:60000

a-dns-google.com:60000

orx.dns-google.org:7795

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      ab345e737a5361eff25a154296b9f909_

    • Size

      596KB

    • MD5

      87f51da6ac1c718aab74c39bb32ba7de

    • SHA1

      37b5749ff70ae8fcbb26a5bb7e99363432e1c368

    • SHA256

      84ab5a1714d831d74bbc16ece2083bf01b9d1f4c2e2196ae96347e36e56ee640

    • SHA512

      373821064abb6038b258e3680fe50f45816061f62c40c7deb4718c42a86dacf7fccaa6eb4c01ae26e4f3fd1aa50cc4632cefa0082334ccec9e97a99d42837b0d

    • SSDEEP

      12288:0PTJS+naeW9kclFEcMWbHdxZ7GkR2fV/6y9P/YAh7Dxu9hc7L:UTJfrW99q4bHdxZ7G1fVFND4XcP

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Xorddos family

    • Executes dropped EXE

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks