General
-
Target
ab345e737a5361eff25a154296b9f909_
-
Size
596KB
-
Sample
241128-mll5favkhx
-
MD5
87f51da6ac1c718aab74c39bb32ba7de
-
SHA1
37b5749ff70ae8fcbb26a5bb7e99363432e1c368
-
SHA256
84ab5a1714d831d74bbc16ece2083bf01b9d1f4c2e2196ae96347e36e56ee640
-
SHA512
373821064abb6038b258e3680fe50f45816061f62c40c7deb4718c42a86dacf7fccaa6eb4c01ae26e4f3fd1aa50cc4632cefa0082334ccec9e97a99d42837b0d
-
SSDEEP
12288:0PTJS+naeW9kclFEcMWbHdxZ7GkR2fV/6y9P/YAh7Dxu9hc7L:UTJfrW99q4bHdxZ7G1fVFND4XcP
Behavioral task
behavioral1
Sample
ab345e737a5361eff25a154296b9f909_
Resource
ubuntu2204-amd64-20240729-en
Malware Config
Extracted
xorddos
dns-google.org:60000
a-dns-google.com:60000
orx.dns-google.org:7795
-
crc_polynomial
EDB88320
Targets
-
-
Target
ab345e737a5361eff25a154296b9f909_
-
Size
596KB
-
MD5
87f51da6ac1c718aab74c39bb32ba7de
-
SHA1
37b5749ff70ae8fcbb26a5bb7e99363432e1c368
-
SHA256
84ab5a1714d831d74bbc16ece2083bf01b9d1f4c2e2196ae96347e36e56ee640
-
SHA512
373821064abb6038b258e3680fe50f45816061f62c40c7deb4718c42a86dacf7fccaa6eb4c01ae26e4f3fd1aa50cc4632cefa0082334ccec9e97a99d42837b0d
-
SSDEEP
12288:0PTJS+naeW9kclFEcMWbHdxZ7GkR2fV/6y9P/YAh7Dxu9hc7L:UTJfrW99q4bHdxZ7G1fVFND4XcP
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Xorddos family
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Scheduled Task/Job
1Cron
1