General
-
Target
task2.bin.elf
-
Size
611KB
-
Sample
250410-mxbg3syry6
-
MD5
a2792875c6a476bcb0256aba2a50bf7b
-
SHA1
571b871cb0f284489c28d9fc72057d6beef77057
-
SHA256
f0925a77cf0d973c935b9f65051bd27bf75887949adc3a06350210a2523961d9
-
SHA512
29aa5d8f29a0e3e8fc10cf2b8d457ffddd7c518c6eed3b8270a3387f463a550a4e3a3b75c678ce3abba3190f4a8607953d0e77139fb65266d29a6ccd907f000b
-
SSDEEP
12288:5BXOviwV1/n/dQFhWlH/c1dHo4h9L+zNZrrIT6yF8EEP4UlUuTh1Au:5BXNkN/+Fhu/Qo4h9L+zNNIBVEBl/91l
Behavioral task
behavioral1
Sample
task2.bin.elf
Resource
ubuntu2404-amd64-20250307-en
Malware Config
Extracted
xorddos
http://aaa.dsaj2a.org/config.rar
ww.dnstells.com:53
ww.gzcfr5axf6.com:53
ww.gzcfr5axf7.com:53
-
crc_polynomial
EDB88320
Targets
-
-
Target
task2.bin.elf
-
Size
611KB
-
MD5
a2792875c6a476bcb0256aba2a50bf7b
-
SHA1
571b871cb0f284489c28d9fc72057d6beef77057
-
SHA256
f0925a77cf0d973c935b9f65051bd27bf75887949adc3a06350210a2523961d9
-
SHA512
29aa5d8f29a0e3e8fc10cf2b8d457ffddd7c518c6eed3b8270a3387f463a550a4e3a3b75c678ce3abba3190f4a8607953d0e77139fb65266d29a6ccd907f000b
-
SSDEEP
12288:5BXOviwV1/n/dQFhWlH/c1dHo4h9L+zNZrrIT6yF8EEP4UlUuTh1Au:5BXNkN/+Fhu/Qo4h9L+zNNIBVEBl/91l
-
XorDDoS
Botnet and downloader malware targeting Linux-based operating systems and IoT devices.
-
XorDDoS payload
-
Xorddos family
-
Writes memory of remote process
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-