General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241201-m4t8rstrem

  • MD5

    e6a2e72aaaf90ebe7d82938e172077aa

  • SHA1

    586d13e40c79839b26ced27f2eec1b6f3ed50138

  • SHA256

    0cf31871ca890b78df73b7cdc4d16804724efb6ecc9479a594027f8839888669

  • SHA512

    2de6dfca2072a2e192f68807acd079c840240b13a7c6b06f801407984d23224e9a5f7c0f1feffb24de8bf0f66760e268a41084b02e628f111339b01216c8e479

  • SSDEEP

    96:ywbeFBJFuwuXZgOFFh+2a92HfNKdHT4XJWOfhY4FBJFuwF9SpHfMWKE+2cwGB:jb2wpgSFh+2a92HfNv5p5MHfLz+2g

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      e6a2e72aaaf90ebe7d82938e172077aa

    • SHA1

      586d13e40c79839b26ced27f2eec1b6f3ed50138

    • SHA256

      0cf31871ca890b78df73b7cdc4d16804724efb6ecc9479a594027f8839888669

    • SHA512

      2de6dfca2072a2e192f68807acd079c840240b13a7c6b06f801407984d23224e9a5f7c0f1feffb24de8bf0f66760e268a41084b02e628f111339b01216c8e479

    • SSDEEP

      96:ywbeFBJFuwuXZgOFFh+2a92HfNKdHT4XJWOfhY4FBJFuwF9SpHfMWKE+2cwGB:jb2wpgSFh+2a92HfNv5p5MHfLz+2g

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (980) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks