General

  • Target

    mdmnpygceatyeq

  • Size

    544KB

  • Sample

    250228-h9zcfsvry6

  • MD5

    f44ae424e83e10004380f6aadceebb15

  • SHA1

    173c9062c3326d4940cf7b6cc70c1a750dda2a49

  • SHA256

    a89c8ef292c00472850398e72e2bfa6beb9e5e460d52863faf6cefa7c6d723f5

  • SHA512

    e05aca5a978932c4b842e04d77c717e88a82fae00e99edb7ed7c2569fbdc9b1dc70a812c21b386f3ee1535a799296e6ecbcda15d0a5e9e73afcfcff6c47bd326

  • SSDEEP

    12288:JbinNy0Y1nvEtXBx6DkkJmAGyPexU279WnjVZ6ySWKZ:1iNy0evmxvkJmApPexUm9cVEb

Malware Config

Extracted

Family

xorddos

C2

topbannersun.com:8623

wowapplecar.com:8623

Attributes
  • crc_polynomial

    CDB88320

xor.plain

Targets

    • Target

      mdmnpygceatyeq

    • Size

      544KB

    • MD5

      f44ae424e83e10004380f6aadceebb15

    • SHA1

      173c9062c3326d4940cf7b6cc70c1a750dda2a49

    • SHA256

      a89c8ef292c00472850398e72e2bfa6beb9e5e460d52863faf6cefa7c6d723f5

    • SHA512

      e05aca5a978932c4b842e04d77c717e88a82fae00e99edb7ed7c2569fbdc9b1dc70a812c21b386f3ee1535a799296e6ecbcda15d0a5e9e73afcfcff6c47bd326

    • SSDEEP

      12288:JbinNy0Y1nvEtXBx6DkkJmAGyPexU279WnjVZ6ySWKZ:1iNy0evmxvkJmApPexUm9cVEb

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Xorddos family

    • Writes memory of remote process

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

MITRE ATT&CK Matrix

Tasks