General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241130-tqepgssmhp

  • MD5

    ee91de469e47f5f54ebdfcf7ef65c3c6

  • SHA1

    32d746051ea6c4a4e59a2aac00b2b4b280c6e9eb

  • SHA256

    9a36958a4d26cded1d7d66285a93286e73a535ff7c20da542d734d8cc2f153d0

  • SHA512

    95646d628867c5dd3bb1cda8620ee820a53eb67b39fcbaac0f348f8c0eb6e9663bdd2d521eb83bb2260b9fe33234cc5d37f5a09c0b04cc9db0e35dc4d6dc7b00

  • SSDEEP

    96:rjYkn3/+UpxBJ8TaM/kn3cQH+188cPuYBJ86+NC/BKE:rjYkDBJ8TaMsBJ8JE

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      ee91de469e47f5f54ebdfcf7ef65c3c6

    • SHA1

      32d746051ea6c4a4e59a2aac00b2b4b280c6e9eb

    • SHA256

      9a36958a4d26cded1d7d66285a93286e73a535ff7c20da542d734d8cc2f153d0

    • SHA512

      95646d628867c5dd3bb1cda8620ee820a53eb67b39fcbaac0f348f8c0eb6e9663bdd2d521eb83bb2260b9fe33234cc5d37f5a09c0b04cc9db0e35dc4d6dc7b00

    • SSDEEP

      96:rjYkn3/+UpxBJ8TaM/kn3cQH+188cPuYBJ86+NC/BKE:rjYkDBJ8TaMsBJ8JE

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (913) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks