General
-
Target
RDDoS_Tool-1.2.zip
-
Size
442KB
-
Sample
250330-wfnwhswks3
-
MD5
38270dbeefa5aed4baa93d5b94777423
-
SHA1
3abae3870ecd122441bc9f622bbd8ee8e5569457
-
SHA256
2bd42c2df09c3894d7e54348ed3733b53ef5842ce81ee77d421a33fb13a42a5c
-
SHA512
61e4788cfe0ed5122ca43a3100888b3ce99b2a3194a245e4af9ac5a055aa683ca02e6d0f00278b986e8a4d6a7e88619d45967e128448320e544c1230ee69146c
-
SSDEEP
12288:d8o1sYY3W1Na3jL1NudBP0Di3awe1fqbQPAOT7m:DsYYm1czL1i6iqF5qc4m7m
Static task
static1
Behavioral task
behavioral1
Sample
RDDoS_Tool-1.2/RDDoS_Tool.py
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
RDDoS_Tool-1.2/RDDoS_Tool.py
Resource
win10v2004-20250314-en
Behavioral task
behavioral3
Sample
RDDoS_Tool-1.2/setup.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral4
Sample
RDDoS_Tool-1.2/setup.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral5
Sample
RDDoS_Tool-1.2/setup.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral6
Sample
RDDoS_Tool-1.2/setup.sh
Resource
debian9-mipsel-20240418-en
Malware Config
Targets
-
-
Target
RDDoS_Tool-1.2/RDDoS_Tool.py
-
Size
5KB
-
MD5
19d57d20cbbb7ac44561da4734195944
-
SHA1
c818c0eac42c267baa1b0bbbb7532585834b1b52
-
SHA256
7d9d0acb8f30998bf9ddf30d69105db7752b5c01e42aa2ea189a1e1a082610be
-
SHA512
5cbaecd848d437a75f02cccda91ebec375040762091db175aa3371b5afb2897d164583de7692ab899662e222e05332fcd977a863e7a24827260aae64f41f3ca9
-
SSDEEP
96:eRoSk89dQGRt5yrB35j4BK0lfwS8Xsd0y08b:HHu3tQN3dKRlfwS8XsdP0q
Score3/10 -
-
-
Target
RDDoS_Tool-1.2/setup.sh
-
Size
515B
-
MD5
58f91511747259052d58b02c7ace24b6
-
SHA1
7b8c42ecce49ffff5b7c8e5a208c16d31f9759b4
-
SHA256
f73d05b428a695cf2aeb5a40439d912c268c7e0e9d37080e087aaf8bd2790339
-
SHA512
31e5f83f3bf9f8a360111a4080c6dc1a3f827f7231eec6133d546e90a240789cada3236caaf8005576837c06850c65c9a2cd2e2e44c0748684388a6f91bdba54
-
Renames multiple (75) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Executes dropped EXE
-
OS Credential Dumping
Adversaries may attempt to dump credentials to use it in password cracking.
-
Write file to user bin folder
-