General
-
Target
a912a7975b9d580280600d32647d384da655787e36fc9f471c54d3ba685f0ea5.elf
-
Size
535KB
-
Sample
250103-rsefds1phn
-
MD5
234f239a92ab7202a403eb85697ee1bf
-
SHA1
3769c30e3647963fa53c0a728275b0897f8f41be
-
SHA256
a912a7975b9d580280600d32647d384da655787e36fc9f471c54d3ba685f0ea5
-
SHA512
da1f77f57a95043c54bb51e6830407303f0654704500e759b7dcd503e519aa65db615991827fe8c149b9c9764f34e58b9c13a841906c8942f05be84a7f7e7af1
-
SSDEEP
12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbz266ySjQn36EojE:/fUywKQ7Fb1pNL/p52fjQn36EuE
Behavioral task
behavioral1
Sample
a912a7975b9d580280600d32647d384da655787e36fc9f471c54d3ba685f0ea5.elf
Resource
ubuntu2204-amd64-20240611-en
Malware Config
Extracted
xorddos
http://aa.hostasa.org/config.rar
ppp.gggatat456.com:1522
ppp.xxxatat456.com:1522
www1.gggatat456.com:1522
-
crc_polynomial
EDB88320
Targets
-
-
Target
a912a7975b9d580280600d32647d384da655787e36fc9f471c54d3ba685f0ea5.elf
-
Size
535KB
-
MD5
234f239a92ab7202a403eb85697ee1bf
-
SHA1
3769c30e3647963fa53c0a728275b0897f8f41be
-
SHA256
a912a7975b9d580280600d32647d384da655787e36fc9f471c54d3ba685f0ea5
-
SHA512
da1f77f57a95043c54bb51e6830407303f0654704500e759b7dcd503e519aa65db615991827fe8c149b9c9764f34e58b9c13a841906c8942f05be84a7f7e7af1
-
SSDEEP
12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbz266ySjQn36EojE:/fUywKQ7Fb1pNL/p52fjQn36EuE
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Xorddos family
-
Executes dropped EXE
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Scheduled Task/Job
1Cron
1