General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241130-rlpyjswlbw

  • MD5

    a5d3dc448d642344e13e489694683276

  • SHA1

    beb14c3403aa18f04afe4401a7c5743b7adb936e

  • SHA256

    2683366855076f245c7ce03f71402314abdf64cffa41f23fa8a2639589722e43

  • SHA512

    7ae86b3efed87a06d4fcab9bb88c0d3c54089acea20c3a27f45c654b847d2f3e825002156db957a51c22fa28480c26b08b873e8afe8e1aeadfa6ae7e7e856abf

  • SSDEEP

    192:3+GW2OINZsAcyZhThDxapTfXsMo06HHNSWbn/aSKF5dTfXsM00cHHNSWDdaSKF5u:I2OINZ/hDkpTfXsMo0En/aSKF5dTfXsv

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      a5d3dc448d642344e13e489694683276

    • SHA1

      beb14c3403aa18f04afe4401a7c5743b7adb936e

    • SHA256

      2683366855076f245c7ce03f71402314abdf64cffa41f23fa8a2639589722e43

    • SHA512

      7ae86b3efed87a06d4fcab9bb88c0d3c54089acea20c3a27f45c654b847d2f3e825002156db957a51c22fa28480c26b08b873e8afe8e1aeadfa6ae7e7e856abf

    • SSDEEP

      192:3+GW2OINZsAcyZhThDxapTfXsMo06HHNSWbn/aSKF5dTfXsM00cHHNSWDdaSKF5u:I2OINZ/hDkpTfXsMo0En/aSKF5dTfXsv

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks