General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241130-zxfg9avphw

  • MD5

    41a9cfa8d65fc7f447a86c05006a99d1

  • SHA1

    d877ea8a4eb062ba3db1aedc1294037d07a52db5

  • SHA256

    6703a1af12e4dd2ca7b26491a6d717cb89e0503b073c06a2dfef3878b0f240ef

  • SHA512

    5fdb1bd620036e5ea47fb7916829b2ff65d36a57b98e49c2975f87f4ae8dab7b571e2fa34591726e3417168ba61d0b9fbc998fbf466bd9f230df83e4810d497c

  • SSDEEP

    96:Yj/TLue1Ln7ELZxBsysKsWVxELWGT0ncr2mgEattd40qU8AYRNRNR4J1gSqu7v7/:YdEC7jWVxENqTPCZRt7jWVx1TPCZRM

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      41a9cfa8d65fc7f447a86c05006a99d1

    • SHA1

      d877ea8a4eb062ba3db1aedc1294037d07a52db5

    • SHA256

      6703a1af12e4dd2ca7b26491a6d717cb89e0503b073c06a2dfef3878b0f240ef

    • SHA512

      5fdb1bd620036e5ea47fb7916829b2ff65d36a57b98e49c2975f87f4ae8dab7b571e2fa34591726e3417168ba61d0b9fbc998fbf466bd9f230df83e4810d497c

    • SSDEEP

      96:Yj/TLue1Ln7ELZxBsysKsWVxELWGT0ncr2mgEattd40qU8AYRNRNR4J1gSqu7v7/:YdEC7jWVxENqTPCZRt7jWVx1TPCZRM

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks