General
-
Target
malware
-
Size
542KB
-
Sample
250331-ltvk4syqs3
-
MD5
c77b5dbffd05dd733b608cee21b1d4a0
-
SHA1
d1cb77973c4a6e23aebc5bdb053ad3289960a86b
-
SHA256
fee023e78183af702d8f57bdbfda2ded848cfa88acae2abb4d63aa24fe30c951
-
SHA512
7c95d9bf5729897fa037b37aedf1242f10129982dd3e09422c008f8ee07bf9f91adb902334faa987f8c4af2d762553fd4ac07ae5d5d008c34d510375689fdf71
-
SSDEEP
12288:VB2bw1CH/FwznbIU9sE8c8lqd49N94wT4JXhLLp6yWrk3k:VB2WCH/eMU9Uc8gd49N94BJXhLL4ruk
Behavioral task
behavioral1
Sample
malware
Resource
ubuntu2204-amd64-20250307-en
Malware Config
Extracted
xorddos
http://ww.wowapplecar.com/config.rar
ee.vvbb321.com:1520
ee.jjkk567.com:1520
ee.nnmm234.com:1520
ee.aass654.com:1520
ee.xxcc789.com:1520
-
crc_polynomial
EDB88320
Targets
-
-
Target
malware
-
Size
542KB
-
MD5
c77b5dbffd05dd733b608cee21b1d4a0
-
SHA1
d1cb77973c4a6e23aebc5bdb053ad3289960a86b
-
SHA256
fee023e78183af702d8f57bdbfda2ded848cfa88acae2abb4d63aa24fe30c951
-
SHA512
7c95d9bf5729897fa037b37aedf1242f10129982dd3e09422c008f8ee07bf9f91adb902334faa987f8c4af2d762553fd4ac07ae5d5d008c34d510375689fdf71
-
SSDEEP
12288:VB2bw1CH/FwznbIU9sE8c8lqd49N94wT4JXhLLp6yWrk3k:VB2WCH/eMU9Uc8gd49N94BJXhLL4ruk
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Xorddos family
-
Executes dropped EXE
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Write file to user bin folder
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Scheduled Task/Job
1Cron
1Privilege Escalation
Boot or Logon Autostart Execution
1Boot or Logon Initialization Scripts
1RC Scripts
1Scheduled Task/Job
1Cron
1