General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241201-e7yflaxkby

  • MD5

    43a7e0e0ca8aa63651fa7f672e7fafd2

  • SHA1

    d584eafdf115abfb917f067045c128f844b16274

  • SHA256

    733dcd188e273babf0c1afe8c2482c6cb61d75171cb0feb800f95c5ffa1f4f86

  • SHA512

    96ecbce3c068b3bc8739e59b2d896e47cb893c309119408a033947484cbd3bc4892bd92ed98b6574817d65bc8f8ee7172626ce74b8d915504fa4bd0a6236bc3a

  • SSDEEP

    96:YD1++8dZyJ0JC99KjtJFuVBbcFYVBCF7gzjtfKZgtXDWA++8dZ0mRZ:Q++8dZyJ0JCzcJEVu2wW9++8dZvZ

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      43a7e0e0ca8aa63651fa7f672e7fafd2

    • SHA1

      d584eafdf115abfb917f067045c128f844b16274

    • SHA256

      733dcd188e273babf0c1afe8c2482c6cb61d75171cb0feb800f95c5ffa1f4f86

    • SHA512

      96ecbce3c068b3bc8739e59b2d896e47cb893c309119408a033947484cbd3bc4892bd92ed98b6574817d65bc8f8ee7172626ce74b8d915504fa4bd0a6236bc3a

    • SSDEEP

      96:YD1++8dZyJ0JC99KjtJFuVBbcFYVBCF7gzjtfKZgtXDWA++8dZ0mRZ:Q++8dZyJ0JCzcJEVu2wW9++8dZvZ

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (798) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks