General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241201-sybr5azjdl

  • MD5

    cb16380cf509277eec9f1b0e1506720c

  • SHA1

    54cfb023dbb8ffff117ccd3152621c482d26d480

  • SHA256

    a665a16ba49682c6dfd69b135542ffcb25d8d61746c7d8127e135e8bc81e00f3

  • SHA512

    b8a0eb43de5b0154fb16438423198451fe8c0dccb7f9c029798768e8dbb13b384bc7e4028d7d6f893dcb634a72d45e12a383dbb6cc60d3523c28658695c89b01

  • SSDEEP

    96:YQMRLn8vLtltFtitpZLHbgL8AhyGPEZtttOH1HVH6YMraA8q23Ln5KC7LztmXnzc:7QQ2wV/uzW1swnw2DhuzW1swkmk+

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      cb16380cf509277eec9f1b0e1506720c

    • SHA1

      54cfb023dbb8ffff117ccd3152621c482d26d480

    • SHA256

      a665a16ba49682c6dfd69b135542ffcb25d8d61746c7d8127e135e8bc81e00f3

    • SHA512

      b8a0eb43de5b0154fb16438423198451fe8c0dccb7f9c029798768e8dbb13b384bc7e4028d7d6f893dcb634a72d45e12a383dbb6cc60d3523c28658695c89b01

    • SSDEEP

      96:YQMRLn8vLtltFtitpZLHbgL8AhyGPEZtttOH1HVH6YMraA8q23Ln5KC7LztmXnzc:7QQ2wV/uzW1swnw2DhuzW1swkmk+

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks