A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #32196  by Fulrem
 Tue Oct 23, 2018 1:37 am
Analysis: https://news.sophos.com/en-us/2018/10/2 ... ot-device/

Payload downloads of bot & lua c2 script are chacha20-ietf encrypted with the initial key state counter field initialised to 1 instead of 0, counter field treated as an arg to the decrypt function so may change in the future.

VT showing limited detection on the bots:
1/55 - https://www.virustotal.com/en/file/b9d3 ... /analysis/
2/55 - https://www.virustotal.com/en/file/366a ... /analysis/
4/55 - https://www.virustotal.com/en/file/050b ... /analysis/
 #32985  by r3dbU7z
 Sat Jun 08, 2019 8:39 am
Image

Disclaimer: This archive is provided for information purposes only. Don't be :devil: !
Archive on VT -> 44b01c348a0ea22969243b1036841f5d149abaf071661dea8e64e16470718ffa

More info:
New China ELF malware DDoS'er "Linux/DDoSMan", bot & its C2 tool

Thank you @unixfreaxjp for report!

I also sent this archive to SophosLabs (the link to the report from Timothy Easton can find in the first post^) But despite the fact that I had to leave my phone number :-/ for this, the parcel probably did not reach the addressee. I'm sorry it happened, I tried. :crying:
You do not have the required permissions to view the files attached to this post.