Open timb-machine opened 2 years ago
Is there any possibility to get the binary?
Different hash and i've not detonated it anywhere but:
.strtab, symbols and strings check out though and it comes up as Unix.Trojan.DDoS_XOR with ClamAV.
Thank You, Man. You are great!
On Wed, 25 May 2022, 3:41 am Tim Brown, @.***> wrote:
Different hash and i've not detonated it anywhere but:
- https://bazaar.abuse.ch/sample/ab6ee08016a05e1b3e4fb07bcdac63756a49ecdc83bc76e0462ee6c309ad639e/
.strtab, symbols and strings check out though and it comes up as Unix.Trojan.DDoS_XOR with ClamAV.
— Reply to this email directly, view it on GitHub https://github.com/timb-machine/linux-malware/issues/439#issuecomment-1136479833, or unsubscribe https://github.com/notifications/unsubscribe-auth/AV566E637W3HD53SW4A5ZNDVLVHZVANCNFSM5WRPTREA . You are receiving this because you commented.Message ID: @.***>
Area
Malware reports
Parent threat
Initial Access, Credential Access, Impact
Finding
https://www.microsoft.com/security/blog/2022/05/19/rise-in-xorddos-a-deeper-look-at-the-stealthy-ddos-malware-targeting-linux-devices/
Industry reference
attack:T1078:Valid Accounts attack:T1100:Brute Force attack:T1498:Network Denial of Service attack:T1053.003:Cron attack:T1105:Ingress Tool Transfer attack:T1027:Obfuscated Files or Information attack:T1014:Rootkit attack:T1082:System Information Discovery attack:T1003.007:Proc Filesystem attack:T1562.001:Disable or Modify Tools attack:T1037.004:RC Scripts attack:T1070.004:File Deletion attack:T1036.005:Match Legitimate Name or Location uses:Non-persistentStorage uses:ioctl uses:PortHiding https://github.com/timb-machine/linux-malware/issues/129 uses:ProcessTreeSpoofing
Malware reference
XorDDoS Rooty
Actor reference
No response
Component
Linux
Scenario
No response