General
-
Target
JaffaCakes118_0081ba6e059dd38a8c0098e71031ec7b
-
Size
247KB
-
Sample
241231-ch4vza1ngt
-
MD5
0081ba6e059dd38a8c0098e71031ec7b
-
SHA1
f3953141c60bca96eb305e99626876662d263f60
-
SHA256
a4917c19543d244216ab440d355e4e87fe806d2dbf57892dd8f62c51804f371a
-
SHA512
91673e9b3eee2a8c6690c8fa7b983cc92c9003e86d6cb673c5d58ab59d4e0752188bd188523417529c73a91955bf454979243e87ad1f0ad1b7d368952a048bdc
-
SSDEEP
6144:nSDFOrnwRgUbMisI6sdkH+M6hWOcy5KOZW7U6NCPhhhR//mqYT:mZRgUY/fsJcO1KOiXOhhhBeT
Behavioral task
behavioral1
Sample
JaffaCakes118_0081ba6e059dd38a8c0098e71031ec7b
Resource
ubuntu2204-amd64-20240611-en
Malware Config
Extracted
xorddos
-
crc_polynomial
EDB88320
Targets
-
-
Target
JaffaCakes118_0081ba6e059dd38a8c0098e71031ec7b
-
Size
247KB
-
MD5
0081ba6e059dd38a8c0098e71031ec7b
-
SHA1
f3953141c60bca96eb305e99626876662d263f60
-
SHA256
a4917c19543d244216ab440d355e4e87fe806d2dbf57892dd8f62c51804f371a
-
SHA512
91673e9b3eee2a8c6690c8fa7b983cc92c9003e86d6cb673c5d58ab59d4e0752188bd188523417529c73a91955bf454979243e87ad1f0ad1b7d368952a048bdc
-
SSDEEP
6144:nSDFOrnwRgUbMisI6sdkH+M6hWOcy5KOZW7U6NCPhhhR//mqYT:mZRgUY/fsJcO1KOiXOhhhBeT
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
Xorddos family
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Scheduled Task/Job
1Cron
1