General
-
Target
JaffaCakes118_01942bbe326395e8bf8312c304b30c21
-
Size
247KB
-
Sample
241231-dascmszqej
-
MD5
01942bbe326395e8bf8312c304b30c21
-
SHA1
b8a481e91c77631aa74b8188b17166d9861dfde0
-
SHA256
9c7e43e5212142a195a794486b13efcc9779f9c0742b608c66c18937856bb452
-
SHA512
914224281378d60adca99c34848485550c1eb29f95a6755d83d10d9a55ea21fb6e973fc5bb144a20b3ebd25b8a8cdc8b5aa819aa2f345c3dada5d39d9c2d1b7b
-
SSDEEP
6144:nSDFOrnwRgUbMisI6sdkH+M6hWOcy5KOZW7U6NCPhhhR//mqYi:mZRgUY/fsJcO1KOiXOhhhBei
Behavioral task
behavioral1
Sample
JaffaCakes118_01942bbe326395e8bf8312c304b30c21
Resource
ubuntu1804-amd64-20240611-en
Malware Config
Extracted
xorddos
-
crc_polynomial
EDB88320
Targets
-
-
Target
JaffaCakes118_01942bbe326395e8bf8312c304b30c21
-
Size
247KB
-
MD5
01942bbe326395e8bf8312c304b30c21
-
SHA1
b8a481e91c77631aa74b8188b17166d9861dfde0
-
SHA256
9c7e43e5212142a195a794486b13efcc9779f9c0742b608c66c18937856bb452
-
SHA512
914224281378d60adca99c34848485550c1eb29f95a6755d83d10d9a55ea21fb6e973fc5bb144a20b3ebd25b8a8cdc8b5aa819aa2f345c3dada5d39d9c2d1b7b
-
SSDEEP
6144:nSDFOrnwRgUbMisI6sdkH+M6hWOcy5KOZW7U6NCPhhhR//mqYi:mZRgUY/fsJcO1KOiXOhhhBei
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
Xorddos family
-
Executes dropped EXE
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Scheduled Task/Job
1Cron
1