Analysis
-
max time kernel
149s -
max time network
150s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
08-02-2025 07:10
Behavioral task
behavioral1
Sample
cvckxesujqpz.elf
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
cvckxesujqpz.elf
-
Size
549KB
-
MD5
27e7ff9211cfa5cfa709a199363cddfb
-
SHA1
e26ee39502fb9da0167da2ea0ab833f263fca32f
-
SHA256
5d94a674992e90b629b2399d37a8a749c68b5a1c4dee28c17a6624bf070a163c
-
SHA512
383475f925bf75cd77321f388eedee0bf116ad50204bdea5800e09e164f8a6de82a71a4d1cfef3a066c03748872e252a24de80fa5b0ffb2ad972f9b0f8ee5a33
-
SSDEEP
12288:VeRvuKqiVZ4En5drNK0pPEfJKlHZ8mG97Qxee6yzmxV:VIv/qiVNHNDEfJKHZ8mG9QeeOV
Malware Config
Extracted
xorddos
bb.markerbio.com:13307
bb.myserv012.com:13307
http://qq.com/lib.asp
-
crc_polynomial
CDB88320
Signatures
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload 1 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_xorddos -
Xorddos family
-
Writes memory of remote process 2 IoCs
pid Process 2434 cvckxesujqpz.elf 2437 cvckxesujqpz.elf -
Loads a kernel module 64 IoCs
Loads a Linux kernel module, potentially to achieve persistence
pid Process 2434 cvckxesujqpz.elf 2438 cvckxesujqpz.elf 2440 cvckxesujqpz.elf 2442 cvckxesujqpz.elf 2445 cvckxesujqpz.elf 2451 cvckxesujqpz.elf 2454 cvckxesujqpz.elf 2435 cvckxesujqpz.elf 2435 cvckxesujqpz.elf 2477 cvckxesujqpz.elf 2479 cvckxesujqpz.elf 2482 cvckxesujqpz.elf 2485 cvckxesujqpz.elf 2488 cvckxesujqpz.elf 2437 cvckxesujqpz.elf 2435 cvckxesujqpz.elf 2437 cvckxesujqpz.elf 2435 cvckxesujqpz.elf 2492 cvckxesujqpz.elf 2494 cvckxesujqpz.elf 2497 cvckxesujqpz.elf 2500 cvckxesujqpz.elf 2503 cvckxesujqpz.elf 2435 cvckxesujqpz.elf 2437 cvckxesujqpz.elf 2437 cvckxesujqpz.elf 2435 cvckxesujqpz.elf 2507 cvckxesujqpz.elf 2509 cvckxesujqpz.elf 2512 cvckxesujqpz.elf 2515 cvckxesujqpz.elf 2518 cvckxesujqpz.elf 2435 cvckxesujqpz.elf 2435 cvckxesujqpz.elf 2523 cvckxesujqpz.elf 2525 cvckxesujqpz.elf 2528 cvckxesujqpz.elf 2531 cvckxesujqpz.elf 2534 cvckxesujqpz.elf 2435 cvckxesujqpz.elf 2435 cvckxesujqpz.elf 2538 cvckxesujqpz.elf 2540 cvckxesujqpz.elf 2543 cvckxesujqpz.elf 2546 cvckxesujqpz.elf 2435 cvckxesujqpz.elf 2435 cvckxesujqpz.elf 2555 cvckxesujqpz.elf 2557 cvckxesujqpz.elf 2560 cvckxesujqpz.elf 2563 cvckxesujqpz.elf 2566 cvckxesujqpz.elf 2435 cvckxesujqpz.elf 2435 cvckxesujqpz.elf 2570 cvckxesujqpz.elf 2572 cvckxesujqpz.elf 2575 cvckxesujqpz.elf 2578 cvckxesujqpz.elf 2581 cvckxesujqpz.elf 2435 cvckxesujqpz.elf 2435 cvckxesujqpz.elf 2585 cvckxesujqpz.elf 2587 cvckxesujqpz.elf 2590 cvckxesujqpz.elf
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5076933ff9904d1110d896e2c525e39e5
SHA14188442577fa77f25820d9b2d01cc446e30684ac
SHA2564cbbd8ca5215b8d161aec181a74b694f4e24b001d5b081dc0030ed797a8973e0
SHA5126fcee9a7b7a7b821d241c03c82377928bc6882e7a08c78a4221199bfa220cdc55212273018ee613317c8293bb8d1ce08d1e017508e94e06ab85a734c99c7cc34
-
Filesize
153B
MD53ed91888310a35e88d32011ece30db9b
SHA19ddf2ad1aaad10a0907f05378382d3646e918abb
SHA256202f0312498fb2187b44d64dce52d09af68d62d6d4b14d59f5e1a2bc2a12f5ba
SHA5120a77965689140857a0076f3fedcfe3405a57e40e3ee6ace1f26738f03e9a7866c8a263b5305916f7c87154b31c2f27ee7520788149005cfc8216304abf13e07c
-
Filesize
32B
MD531cf512a22acd1c6446e4ee40da353bd
SHA16dee20e8a624ed132d2363b93ef9ccd194518aad
SHA256e8f4ec51d57392185159a4ce935d3c49b9e85ed6fa5d4357cb2cbff6a45e9330
SHA5121b51e83692c41218300cd672ac92fd173e0bcd639d59b7f79d89ded77e83b2ef7cbd45438956fbd2865fd8ecc68dd4154b55cbba75f5087e406a86fe4724c414
-
Filesize
549KB
MD527e7ff9211cfa5cfa709a199363cddfb
SHA1e26ee39502fb9da0167da2ea0ab833f263fca32f
SHA2565d94a674992e90b629b2399d37a8a749c68b5a1c4dee28c17a6624bf070a163c
SHA512383475f925bf75cd77321f388eedee0bf116ad50204bdea5800e09e164f8a6de82a71a4d1cfef3a066c03748872e252a24de80fa5b0ffb2ad972f9b0f8ee5a33