General

  • Target

    4086221b3dd9ebfee8fa4cb285e268386dfbbe6e2ed5b8e3e31b618331acf051.zip

  • Size

    280KB

  • Sample

    250325-y1ejpavrx2

  • MD5

    11dd210e76bbab8d625fbab015936e05

  • SHA1

    8dd3978bdb9a0bf00f5fdf30f586d51f014084bd

  • SHA256

    4086221b3dd9ebfee8fa4cb285e268386dfbbe6e2ed5b8e3e31b618331acf051

  • SHA512

    6a4577198a9f870809f534fd66d00ad5ed4f1b6d21cd9e43fdef7a6e2ed36f0203e2d0f09cc42bf5f5e440cff221a33b795ac22fc21808b872a52e6434bc55a8

  • SSDEEP

    6144:71fOTRis/mSRgAoxaZ4iE0hqpEfV8wyu6zvzJPUtOCr6HH3WrDLQe:71mtisuKgxxBGuEfVD76zvz1pC+wQe

Malware Config

Extracted

Family

xorddos

C2

http://aa.hostasa.org/config.rar

cdn.cloud2cdn.com:8080

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      1e87a5dba16588bf91144de1b34a524bc70c39c88bca63f79dd95d3087253d72.elf

    • Size

      611KB

    • MD5

      e7a3aa891e550834f9af4367a564e468

    • SHA1

      38962368d0b3ea97126372410b101a19c8130532

    • SHA256

      1e87a5dba16588bf91144de1b34a524bc70c39c88bca63f79dd95d3087253d72

    • SHA512

      7f5257d7316a864f63ee2b8fed51f97d55ad1b5c1db458a93a57b0cfde0694ff186ef576f9e8c76c96721def61877a0072c51ca7bf5dc5b1dd0b097135c2e9da

    • SSDEEP

      12288:FBXOvdwV1/n/dQFhWlH/c1dHo4h9L+zNZrrUT6yF8EEP4UlUuTh1AG:FBXmkN/+Fhu/Qo4h9L+zNNUBVEBl/91h

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Xorddos family

    • Writes memory of remote process

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

MITRE ATT&CK Enterprise v15

Tasks