General
-
Target
malware_ygljglkjgfg0.zip
-
Size
251KB
-
Sample
250211-jghpnsznel
-
MD5
e60a7783bef03817b79cfb1df14591a9
-
SHA1
529f3a8f3472c06695715f62c83b59c418be4c22
-
SHA256
fe4d37f48c5932d71dba259f8eebd5b3eb7c9aa5bfd8d27146a225a3f9dc9927
-
SHA512
2b9d67ed0d8e9663a25f20d86dedf821eb7c98042da0980c5a151ab012c28cb25ad6df15723219ce7482e0fb8b478e61069defddfd1d59a08a648c1e77900852
-
SSDEEP
3072:gPwufD6uyL2APl9ONW4K6h90MOQOgOJZzuZ1RsoUzjWz0QTm1OlZvRVnxiYEr+7W:gPtm5RtA8o4DgZmm4zOtVxiPLrLTsjxC
Behavioral task
behavioral1
Sample
usr/bin/ygljglkjgfg0
Resource
ubuntu2204-amd64-20240522.1-en
Malware Config
Extracted
xorddos
https://ww.aass654.com/config.rar
ee.aass654.com:1520
ee.xxcc789.com:1520
ee.vvbb321.com:1520
ee.jjkk567.com:1520
ee.nnmm234.com:1520
-
crc_polynomial
EDB88320
Targets
-
-
Target
usr/bin/ygljglkjgfg0
-
Size
535KB
-
MD5
694a672878a1f7945c020a0a3ca74367
-
SHA1
148caeaa8ac7fdf46d48fc2d1d0020d1bf41d442
-
SHA256
75bfd448e4274cc4e5804c43768f62a36ccb3fc3b1df06e14d9c892daa2cde19
-
SHA512
a239845b91d64b8559192e4683e2faa16ad0c8987bfc142cf692f620bd5fefa0d8d0bbe2e7f5f59651435eec4350e3574171d33e7cd4656136b539bccd00fb60
-
SSDEEP
12288:4Ufrcn+vwK5ripVU4tdZ1pNL/pVbzP66ySjQn36Eoj:/fUywKQ7Fb1pNL/p5PfjQn36Eu
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Xorddos family
-
Deletes itself
-
Executes dropped EXE
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Scheduled Task/Job
1Cron
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Scheduled Task/Job
1Cron
1