General
-
Target
024fbf4b2685736ef0b1bfe8ae62cee0a6ce3da526a7aba21c8c736c993412d8.elf
-
Size
535KB
-
Sample
250103-rsefdsymes
-
MD5
605b7525cc4ce173ea4a1575860e7487
-
SHA1
07d243a73fea7a93f2d43890dbb7116f2467204d
-
SHA256
024fbf4b2685736ef0b1bfe8ae62cee0a6ce3da526a7aba21c8c736c993412d8
-
SHA512
ee6cd529d27adab0d5724108cf40e69be08d717821a11432371f3665847e4a4a12f0c6ebde8712ced643a0339a34050630ec097c62f7f0193a470ce488da6cef
-
SSDEEP
12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbz266ySjQn36Eojp:/fUywKQ7Fb1pNL/p52fjQn36Eup
Behavioral task
behavioral1
Sample
024fbf4b2685736ef0b1bfe8ae62cee0a6ce3da526a7aba21c8c736c993412d8.elf
Resource
ubuntu2404-amd64-20240523-en
Malware Config
Extracted
xorddos
http://aa.hostasa.org/config.rar
ppp.gggatat456.com:1522
ppp.xxxatat456.com:1522
www1.gggatat456.com:1522
-
crc_polynomial
EDB88320
Targets
-
-
Target
024fbf4b2685736ef0b1bfe8ae62cee0a6ce3da526a7aba21c8c736c993412d8.elf
-
Size
535KB
-
MD5
605b7525cc4ce173ea4a1575860e7487
-
SHA1
07d243a73fea7a93f2d43890dbb7116f2467204d
-
SHA256
024fbf4b2685736ef0b1bfe8ae62cee0a6ce3da526a7aba21c8c736c993412d8
-
SHA512
ee6cd529d27adab0d5724108cf40e69be08d717821a11432371f3665847e4a4a12f0c6ebde8712ced643a0339a34050630ec097c62f7f0193a470ce488da6cef
-
SSDEEP
12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbz266ySjQn36Eojp:/fUywKQ7Fb1pNL/p52fjQn36Eup
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Xorddos family
-
Writes memory of remote process
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-