General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241201-1qrglsykgl

  • MD5

    51d2a16062cf53c07946af78c250d684

  • SHA1

    e98e2960f116e30e208e01cefdb4a2baaab6958b

  • SHA256

    8beea9ee2f7c42432b5798c9ec2cfbb4ebe848ff58d16dd413e9dd5e05243df8

  • SHA512

    f65677631c37b240bc2e9be743e7f1cdb100be6551bd41dea3c5aa5f002f76d38f177dc18d07eec5239456cb6fb06c00ba87510b3067bd6b096db403f87b48a0

  • SSDEEP

    192:V+4+8+f+O+++mG6BogpeuaEsp0JXf4txZs7cYBa6GvNR16/nYG6BogguaEQB+4+h:VpB+3TzeuaEsuws8vNR16/nVuaEwpB+j

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      51d2a16062cf53c07946af78c250d684

    • SHA1

      e98e2960f116e30e208e01cefdb4a2baaab6958b

    • SHA256

      8beea9ee2f7c42432b5798c9ec2cfbb4ebe848ff58d16dd413e9dd5e05243df8

    • SHA512

      f65677631c37b240bc2e9be743e7f1cdb100be6551bd41dea3c5aa5f002f76d38f177dc18d07eec5239456cb6fb06c00ba87510b3067bd6b096db403f87b48a0

    • SSDEEP

      192:V+4+8+f+O+++mG6BogpeuaEsp0JXf4txZs7cYBa6GvNR16/nYG6BogguaEQB+4+h:VpB+3TzeuaEsuws8vNR16/nVuaEwpB+j

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks