General
-
Target
mdmnpygceatyeq
-
Size
544KB
-
Sample
250228-h9zcfsvry6
-
MD5
f44ae424e83e10004380f6aadceebb15
-
SHA1
173c9062c3326d4940cf7b6cc70c1a750dda2a49
-
SHA256
a89c8ef292c00472850398e72e2bfa6beb9e5e460d52863faf6cefa7c6d723f5
-
SHA512
e05aca5a978932c4b842e04d77c717e88a82fae00e99edb7ed7c2569fbdc9b1dc70a812c21b386f3ee1535a799296e6ecbcda15d0a5e9e73afcfcff6c47bd326
-
SSDEEP
12288:JbinNy0Y1nvEtXBx6DkkJmAGyPexU279WnjVZ6ySWKZ:1iNy0evmxvkJmApPexUm9cVEb
Behavioral task
behavioral1
Sample
mdmnpygceatyeq
Resource
ubuntu2404-amd64-20240523-en
Malware Config
Extracted
xorddos
topbannersun.com:8623
wowapplecar.com:8623
-
crc_polynomial
CDB88320
Targets
-
-
Target
mdmnpygceatyeq
-
Size
544KB
-
MD5
f44ae424e83e10004380f6aadceebb15
-
SHA1
173c9062c3326d4940cf7b6cc70c1a750dda2a49
-
SHA256
a89c8ef292c00472850398e72e2bfa6beb9e5e460d52863faf6cefa7c6d723f5
-
SHA512
e05aca5a978932c4b842e04d77c717e88a82fae00e99edb7ed7c2569fbdc9b1dc70a812c21b386f3ee1535a799296e6ecbcda15d0a5e9e73afcfcff6c47bd326
-
SSDEEP
12288:JbinNy0Y1nvEtXBx6DkkJmAGyPexU279WnjVZ6ySWKZ:1iNy0evmxvkJmApPexUm9cVEb
Score10/10-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Xorddos family
-
Writes memory of remote process
-