General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241129-2cre5azjdz

  • MD5

    661933a74eaf8348108fc0f2ea76e8b3

  • SHA1

    777f720712e261d7fc20132401f8255a95076c95

  • SHA256

    45d09d0767324420fd07d1d53b288256fb241f615992e63afb8fcf7a3a320c17

  • SHA512

    1c83e72930244bcc34ecc50143ff5a9f6e9aaacf683554e0439d75b652ba27d8d3edbf03578aa8ed267c31bc65c34209a9df6f859f55e3f87318fd1695cdf3fb

  • SSDEEP

    96:Cllja2/4rEpnh9Fe+ZlxEQmIHWPaT8Mf6P2RXllja2SnrMnftg+h9Fe+aylxEmQj:aP9h9Fe+HmIHWPAyPIh9Fe+e

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      661933a74eaf8348108fc0f2ea76e8b3

    • SHA1

      777f720712e261d7fc20132401f8255a95076c95

    • SHA256

      45d09d0767324420fd07d1d53b288256fb241f615992e63afb8fcf7a3a320c17

    • SHA512

      1c83e72930244bcc34ecc50143ff5a9f6e9aaacf683554e0439d75b652ba27d8d3edbf03578aa8ed267c31bc65c34209a9df6f859f55e3f87318fd1695cdf3fb

    • SSDEEP

      96:Cllja2/4rEpnh9Fe+ZlxEQmIHWPaT8Mf6P2RXllja2SnrMnftg+h9Fe+aylxEmQj:aP9h9Fe+HmIHWPAyPIh9Fe+e

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (1052) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks