General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241201-q2nvraspc1

  • MD5

    b7efdb6411845379ea3e0068e4024978

  • SHA1

    84d6dc35c3a3bf37878895192e863bad21231e36

  • SHA256

    641bfa6fb04b615de3424c5c914833a0928fd5c9df883aec915c102ad85b48bc

  • SHA512

    7a70881e139c4e468f8272002cd1c78fc03f50b7becd58a08ca44c692be4b6ec853046780c0a07ba4bdc1f7fc7affce4f4d186c5f3aafe553db2bb639bbd14b1

  • SSDEEP

    192:9FOQlBXQhxBh0fjsbXzCtFYTHAw0XzCtFwTHhkOQlBsnBh0fj6:9FOQlpQhxBh0fjsbXzCtFYTHAw0XzCtg

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      b7efdb6411845379ea3e0068e4024978

    • SHA1

      84d6dc35c3a3bf37878895192e863bad21231e36

    • SHA256

      641bfa6fb04b615de3424c5c914833a0928fd5c9df883aec915c102ad85b48bc

    • SHA512

      7a70881e139c4e468f8272002cd1c78fc03f50b7becd58a08ca44c692be4b6ec853046780c0a07ba4bdc1f7fc7affce4f4d186c5f3aafe553db2bb639bbd14b1

    • SSDEEP

      192:9FOQlBXQhxBh0fjsbXzCtFYTHAw0XzCtFwTHhkOQlBsnBh0fj6:9FOQlpQhxBh0fjsbXzCtFYTHAw0XzCtg

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks