General

  • Target

    malware_ygljglkjgfg0.zip

  • Size

    251KB

  • Sample

    250211-jghpnsznel

  • MD5

    e60a7783bef03817b79cfb1df14591a9

  • SHA1

    529f3a8f3472c06695715f62c83b59c418be4c22

  • SHA256

    fe4d37f48c5932d71dba259f8eebd5b3eb7c9aa5bfd8d27146a225a3f9dc9927

  • SHA512

    2b9d67ed0d8e9663a25f20d86dedf821eb7c98042da0980c5a151ab012c28cb25ad6df15723219ce7482e0fb8b478e61069defddfd1d59a08a648c1e77900852

  • SSDEEP

    3072:gPwufD6uyL2APl9ONW4K6h90MOQOgOJZzuZ1RsoUzjWz0QTm1OlZvRVnxiYEr+7W:gPtm5RtA8o4DgZmm4zOtVxiPLrLTsjxC

Malware Config

Extracted

Family

xorddos

C2

https://ww.aass654.com/config.rar

ee.aass654.com:1520

ee.xxcc789.com:1520

ee.vvbb321.com:1520

ee.jjkk567.com:1520

ee.nnmm234.com:1520

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      usr/bin/ygljglkjgfg0

    • Size

      535KB

    • MD5

      694a672878a1f7945c020a0a3ca74367

    • SHA1

      148caeaa8ac7fdf46d48fc2d1d0020d1bf41d442

    • SHA256

      75bfd448e4274cc4e5804c43768f62a36ccb3fc3b1df06e14d9c892daa2cde19

    • SHA512

      a239845b91d64b8559192e4683e2faa16ad0c8987bfc142cf692f620bd5fefa0d8d0bbe2e7f5f59651435eec4350e3574171d33e7cd4656136b539bccd00fb60

    • SSDEEP

      12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbzP66ySjQn36Eoj:/fUywKQ7Fb1pNL/p5PfjQn36Eu

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Xorddos family

    • Deletes itself

    • Executes dropped EXE

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Modifies init.d

      Adds/modifies system service, likely for persistence.

    • Write file to user bin folder

MITRE ATT&CK Enterprise v15

Tasks