General

  • Target

    024fbf4b2685736ef0b1bfe8ae62cee0a6ce3da526a7aba21c8c736c993412d8.elf

  • Size

    535KB

  • Sample

    250103-rsefdsymes

  • MD5

    605b7525cc4ce173ea4a1575860e7487

  • SHA1

    07d243a73fea7a93f2d43890dbb7116f2467204d

  • SHA256

    024fbf4b2685736ef0b1bfe8ae62cee0a6ce3da526a7aba21c8c736c993412d8

  • SHA512

    ee6cd529d27adab0d5724108cf40e69be08d717821a11432371f3665847e4a4a12f0c6ebde8712ced643a0339a34050630ec097c62f7f0193a470ce488da6cef

  • SSDEEP

    12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbz266ySjQn36Eojp:/fUywKQ7Fb1pNL/p52fjQn36Eup

Malware Config

Extracted

Family

xorddos

C2

http://aa.hostasa.org/config.rar

ppp.gggatat456.com:1522

ppp.xxxatat456.com:1522

www1.gggatat456.com:1522

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      024fbf4b2685736ef0b1bfe8ae62cee0a6ce3da526a7aba21c8c736c993412d8.elf

    • Size

      535KB

    • MD5

      605b7525cc4ce173ea4a1575860e7487

    • SHA1

      07d243a73fea7a93f2d43890dbb7116f2467204d

    • SHA256

      024fbf4b2685736ef0b1bfe8ae62cee0a6ce3da526a7aba21c8c736c993412d8

    • SHA512

      ee6cd529d27adab0d5724108cf40e69be08d717821a11432371f3665847e4a4a12f0c6ebde8712ced643a0339a34050630ec097c62f7f0193a470ce488da6cef

    • SSDEEP

      12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbz266ySjQn36Eojp:/fUywKQ7Fb1pNL/p52fjQn36Eup

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Xorddos family

    • Writes memory of remote process

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

MITRE ATT&CK Enterprise v15

Tasks