General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241201-mmlkastpgq

  • MD5

    f84f95a5867eb76b279c716d6d2adb86

  • SHA1

    dd07fb31c48c4e26a796f1bd78c7da85ad1bcf4a

  • SHA256

    e0c5c9dc999c2ee0daea5cbf1fc7994356979631e611157f420c261e19225f20

  • SHA512

    d83ed19c16c48a063f350e5774707c2cdd72abb1992365838f9b92d35bc6661c5629ef778ee16574996f4eef9d285056e1ea2a1ef631fc0035f5ccda521848b4

  • SSDEEP

    96:YWGtG2PwLA8KLNNIl4l0lJFuwBsw+yKFXZLYU9L+uvHwssFUlBl5laLi6Osi5iRD:pWeIp9gFu3/aCHAoS/kamZAoks3/S

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      f84f95a5867eb76b279c716d6d2adb86

    • SHA1

      dd07fb31c48c4e26a796f1bd78c7da85ad1bcf4a

    • SHA256

      e0c5c9dc999c2ee0daea5cbf1fc7994356979631e611157f420c261e19225f20

    • SHA512

      d83ed19c16c48a063f350e5774707c2cdd72abb1992365838f9b92d35bc6661c5629ef778ee16574996f4eef9d285056e1ea2a1ef631fc0035f5ccda521848b4

    • SSDEEP

      96:YWGtG2PwLA8KLNNIl4l0lJFuwBsw+yKFXZLYU9L+uvHwssFUlBl5laLi6Osi5iRD:pWeIp9gFu3/aCHAoS/kamZAoks3/S

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks