General

  • Target

    task2.bin.elf

  • Size

    611KB

  • Sample

    250410-my8h7szjv4

  • MD5

    a2792875c6a476bcb0256aba2a50bf7b

  • SHA1

    571b871cb0f284489c28d9fc72057d6beef77057

  • SHA256

    f0925a77cf0d973c935b9f65051bd27bf75887949adc3a06350210a2523961d9

  • SHA512

    29aa5d8f29a0e3e8fc10cf2b8d457ffddd7c518c6eed3b8270a3387f463a550a4e3a3b75c678ce3abba3190f4a8607953d0e77139fb65266d29a6ccd907f000b

  • SSDEEP

    12288:5BXOviwV1/n/dQFhWlH/c1dHo4h9L+zNZrrIT6yF8EEP4UlUuTh1Au:5BXNkN/+Fhu/Qo4h9L+zNNIBVEBl/91l

Malware Config

Extracted

Family

xorddos

C2

http://aaa.dsaj2a.org/config.rar

ww.dnstells.com:53

ww.gzcfr5axf6.com:53

ww.gzcfr5axf7.com:53

Attributes
  • crc_polynomial

    EDB88320

xor.plain

Targets

    • Target

      task2.bin.elf

    • Size

      611KB

    • MD5

      a2792875c6a476bcb0256aba2a50bf7b

    • SHA1

      571b871cb0f284489c28d9fc72057d6beef77057

    • SHA256

      f0925a77cf0d973c935b9f65051bd27bf75887949adc3a06350210a2523961d9

    • SHA512

      29aa5d8f29a0e3e8fc10cf2b8d457ffddd7c518c6eed3b8270a3387f463a550a4e3a3b75c678ce3abba3190f4a8607953d0e77139fb65266d29a6ccd907f000b

    • SSDEEP

      12288:5BXOviwV1/n/dQFhWlH/c1dHo4h9L+zNZrrIT6yF8EEP4UlUuTh1Au:5BXNkN/+Fhu/Qo4h9L+zNNIBVEBl/91l

    • XorDDoS

      Botnet and downloader malware targeting Linux-based operating systems and IoT devices.

    • XorDDoS payload

    • Xorddos family

    • Writes memory of remote process

    • Loads a kernel module

      Loads a Linux kernel module, potentially to achieve persistence

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

MITRE ATT&CK Enterprise v16

Tasks