General

  • Target

    309310036d4a92c12131cc0a0455005a0c9f7e73a102081c2e146e77640fbc55.elf

  • Size

    535KB

  • Sample

    250103-rsefds1php

  • MD5

    b942a12b9260eff39da67a89c096ed34

  • SHA1

    9e85eda9b6bdf0232f4934924e81b90e15a55a30

  • SHA256

    309310036d4a92c12131cc0a0455005a0c9f7e73a102081c2e146e77640fbc55

  • SHA512

    a983ecac632d2693403ebe77f19c86a1ee5ae90d1f37e1d685a607c9b939f3d6b7c12507a2eb8f48e5e5cd8bf4aeee601fee9357c226f11fb35b491034677e59

  • SSDEEP

    12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbz266ySjQn36Eoj9:/fUywKQ7Fb1pNL/p52fjQn36Eu9

Malware Config

Extracted

Family

xorddos

C2

http://aa.hostasa.org/config.rar

ppp.gggatat456.com:1522

ppp.xxxatat456.com:1522

www1.gggatat456.com:1522

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      309310036d4a92c12131cc0a0455005a0c9f7e73a102081c2e146e77640fbc55.elf

    • Size

      535KB

    • MD5

      b942a12b9260eff39da67a89c096ed34

    • SHA1

      9e85eda9b6bdf0232f4934924e81b90e15a55a30

    • SHA256

      309310036d4a92c12131cc0a0455005a0c9f7e73a102081c2e146e77640fbc55

    • SHA512

      a983ecac632d2693403ebe77f19c86a1ee5ae90d1f37e1d685a607c9b939f3d6b7c12507a2eb8f48e5e5cd8bf4aeee601fee9357c226f11fb35b491034677e59

    • SSDEEP

      12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbz266ySjQn36Eoj9:/fUywKQ7Fb1pNL/p52fjQn36Eu9

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Xorddos family

    • Writes memory of remote process

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

MITRE ATT&CK Enterprise v15

Tasks