General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241130-sylmbs1rbl

  • MD5

    f796cacd37166675c4c1f925e941261c

  • SHA1

    bb8d335e63d78a4a22d5f8c163391bc12d67037c

  • SHA256

    6893c7f081f92bc5a6e641d0313012fe5badc44d102689a832c5605957dc45b0

  • SHA512

    606ba690000a04a876431c0c743d95dd473b7b9726a4fa782fa1fcc326b0e306a13c1b4683d095e337a2fe5329336df41d2b2202d4238f85bf00a82b1aad02b0

  • SSDEEP

    192:S9VIHPINZ3TnyZhTKIQadqOXsMH0nooNSWCMQfHKF5bqOXsMb0looNSW65fHKF5N:fHPINZ4KIjdqOXsMH0gMQfHKF5bqOXs1

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      f796cacd37166675c4c1f925e941261c

    • SHA1

      bb8d335e63d78a4a22d5f8c163391bc12d67037c

    • SHA256

      6893c7f081f92bc5a6e641d0313012fe5badc44d102689a832c5605957dc45b0

    • SHA512

      606ba690000a04a876431c0c743d95dd473b7b9726a4fa782fa1fcc326b0e306a13c1b4683d095e337a2fe5329336df41d2b2202d4238f85bf00a82b1aad02b0

    • SSDEEP

      192:S9VIHPINZ3TnyZhTKIQadqOXsMH0nooNSWCMQfHKF5bqOXsMb0looNSW65fHKF5N:fHPINZ4KIjdqOXsMH0gMQfHKF5bqOXs1

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks