General
-
Target
mdmnpygceatyeq
-
Size
544KB
-
Sample
250228-h3g5lavp19
-
MD5
f44ae424e83e10004380f6aadceebb15
-
SHA1
173c9062c3326d4940cf7b6cc70c1a750dda2a49
-
SHA256
a89c8ef292c00472850398e72e2bfa6beb9e5e460d52863faf6cefa7c6d723f5
-
SHA512
e05aca5a978932c4b842e04d77c717e88a82fae00e99edb7ed7c2569fbdc9b1dc70a812c21b386f3ee1535a799296e6ecbcda15d0a5e9e73afcfcff6c47bd326
-
SSDEEP
12288:JbinNy0Y1nvEtXBx6DkkJmAGyPexU279WnjVZ6ySWKZ:1iNy0evmxvkJmApPexUm9cVEb
Behavioral task
behavioral1
Sample
mdmnpygceatyeq
Resource
ubuntu1804-amd64-20240611-en
Malware Config
Extracted
xorddos
topbannersun.com:8623
wowapplecar.com:8623
-
crc_polynomial
CDB88320
Targets
-
-
Target
mdmnpygceatyeq
-
Size
544KB
-
MD5
f44ae424e83e10004380f6aadceebb15
-
SHA1
173c9062c3326d4940cf7b6cc70c1a750dda2a49
-
SHA256
a89c8ef292c00472850398e72e2bfa6beb9e5e460d52863faf6cefa7c6d723f5
-
SHA512
e05aca5a978932c4b842e04d77c717e88a82fae00e99edb7ed7c2569fbdc9b1dc70a812c21b386f3ee1535a799296e6ecbcda15d0a5e9e73afcfcff6c47bd326
-
SSDEEP
12288:JbinNy0Y1nvEtXBx6DkkJmAGyPexU279WnjVZ6ySWKZ:1iNy0evmxvkJmApPexUm9cVEb
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Xorddos family
-
Deletes itself
-
Executes dropped EXE
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Writes file to system bin folder
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Scheduled Task/Job
1Cron
1