General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241129-xr3dqawlfn

  • MD5

    9c78593f3247a81ae638fe8b8463b71e

  • SHA1

    0775065718970d81dc47eeeede73fa2063f74554

  • SHA256

    1ada6782b73be9bad01cc49d5c1a17cddeb96112995fe104e69fcfaff3ff28c8

  • SHA512

    25b0a058e86e6b106a46f84ec8fd78eaefd5f6cf6403a471fdb86cd99470f000a751c45c8c91e6b7f29dee46c38563feb95c7d51b40ebd1438e496a567bdc8fc

  • SSDEEP

    96:kIcMJRrMGOU3by18oiffO9L91wAQaUX2QFZPYAjpF9QQdzllv6XJFZPYA8dgpF9i:hMGOU3b89L9761GOU3bmLp

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      9c78593f3247a81ae638fe8b8463b71e

    • SHA1

      0775065718970d81dc47eeeede73fa2063f74554

    • SHA256

      1ada6782b73be9bad01cc49d5c1a17cddeb96112995fe104e69fcfaff3ff28c8

    • SHA512

      25b0a058e86e6b106a46f84ec8fd78eaefd5f6cf6403a471fdb86cd99470f000a751c45c8c91e6b7f29dee46c38563feb95c7d51b40ebd1438e496a567bdc8fc

    • SSDEEP

      96:kIcMJRrMGOU3by18oiffO9L91wAQaUX2QFZPYAjpF9QQdzllv6XJFZPYA8dgpF9i:hMGOU3b89L9761GOU3bmLp

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (2044) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks