Analysis
-
max time kernel
149s -
max time network
153s -
platform
ubuntu-24.04_amd64 -
resource
ubuntu2404-amd64-20240523-en -
resource tags
arch:amd64arch:i386image:ubuntu2404-amd64-20240523-enkernel:6.8.0-31-genericlocale:en-usos:ubuntu-24.04-amd64system -
submitted
28/02/2025, 07:26
Behavioral task
behavioral1
Sample
mdmnpygceatyeq
Resource
ubuntu2404-amd64-20240523-en
General
-
Target
mdmnpygceatyeq
-
Size
544KB
-
MD5
f44ae424e83e10004380f6aadceebb15
-
SHA1
173c9062c3326d4940cf7b6cc70c1a750dda2a49
-
SHA256
a89c8ef292c00472850398e72e2bfa6beb9e5e460d52863faf6cefa7c6d723f5
-
SHA512
e05aca5a978932c4b842e04d77c717e88a82fae00e99edb7ed7c2569fbdc9b1dc70a812c21b386f3ee1535a799296e6ecbcda15d0a5e9e73afcfcff6c47bd326
-
SSDEEP
12288:JbinNy0Y1nvEtXBx6DkkJmAGyPexU279WnjVZ6ySWKZ:1iNy0evmxvkJmApPexUm9cVEb
Malware Config
Extracted
xorddos
topbannersun.com:8623
wowapplecar.com:8623
-
crc_polynomial
CDB88320
Signatures
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload 1 IoCs
resource yara_rule behavioral1/files/fstream-2.dat family_xorddos -
Xorddos family
-
Writes memory of remote process 2 IoCs
pid Process 2869 mdmnpygceatyeq 2872 mdmnpygceatyeq -
Loads a kernel module 64 IoCs
Loads a Linux kernel module, potentially to achieve persistence
pid Process 2869 mdmnpygceatyeq 2873 mdmnpygceatyeq 2872 mdmnpygceatyeq 2875 mdmnpygceatyeq 2877 mdmnpygceatyeq 2883 mdmnpygceatyeq 2886 mdmnpygceatyeq 2889 mdmnpygceatyeq 2870 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2870 mdmnpygceatyeq 2893 mdmnpygceatyeq 2895 mdmnpygceatyeq 2898 mdmnpygceatyeq 2901 mdmnpygceatyeq 2904 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2870 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2870 mdmnpygceatyeq 2908 mdmnpygceatyeq 2910 mdmnpygceatyeq 2913 mdmnpygceatyeq 2916 mdmnpygceatyeq 2919 mdmnpygceatyeq 2870 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2870 mdmnpygceatyeq 2923 mdmnpygceatyeq 2925 mdmnpygceatyeq 2929 mdmnpygceatyeq 2931 mdmnpygceatyeq 2934 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2870 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq 2872 mdmnpygceatyeq
Processes
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16B
MD5076933ff9904d1110d896e2c525e39e5
SHA14188442577fa77f25820d9b2d01cc446e30684ac
SHA2564cbbd8ca5215b8d161aec181a74b694f4e24b001d5b081dc0030ed797a8973e0
SHA5126fcee9a7b7a7b821d241c03c82377928bc6882e7a08c78a4221199bfa220cdc55212273018ee613317c8293bb8d1ce08d1e017508e94e06ab85a734c99c7cc34
-
Filesize
151B
MD5df8177ee97c13e3f34698ccda1a79345
SHA12ba03e7a8fb6494533134045d507600263019410
SHA256e2fa7920e26919de3417e42777ae588eaa81222558909846e1aedd2769fc5e28
SHA512c03f9be1d8042f1a4d15e149b62a7ebd3beb08a1bbb0010a178f611b2552819a7b5b3f762e3322123fa6d47a7b6f0c0bb2ee44c343579103d0dde9895ededfe5
-
Filesize
32B
MD5ce648b957fe9cff4f7bafd958d62dab7
SHA180a23693683134d54372bdf93d8afa639df1734a
SHA256f2e5010a497115399c93399f14c1450f1a84e1bb6fb3358f1073d36598faf69a
SHA512ac57f9704293cd3a5c6a2aaaccaa578bd5ded7235b7fffda18d3c48786d76d0613515af4e7909b427ac46f41c5fc346c29040519ec9581d510bfa509b88c7c1e
-
Filesize
544KB
MD5f44ae424e83e10004380f6aadceebb15
SHA1173c9062c3326d4940cf7b6cc70c1a750dda2a49
SHA256a89c8ef292c00472850398e72e2bfa6beb9e5e460d52863faf6cefa7c6d723f5
SHA512e05aca5a978932c4b842e04d77c717e88a82fae00e99edb7ed7c2569fbdc9b1dc70a812c21b386f3ee1535a799296e6ecbcda15d0a5e9e73afcfcff6c47bd326