General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241201-tvsrxawkbs

  • MD5

    e226f4e480e52ae79826b49d0b0f8c54

  • SHA1

    004bd67b8f4733cf6527a66931412d90273f30bd

  • SHA256

    6a9c67ca0847c6e365c8305e49d8cc672fd4191ba319611b95d18e88103ebda8

  • SHA512

    45c9c63383eae1a4593d5da156e0ea505aea3e0faff239cc3ef33502dee391bc612d326e8c8c6d756593f2d114af4d946c1f955eaf6a2e2efaf0d036d1bf1337

  • SSDEEP

    96:fpGgtoc86vzNi/ME8bPUXg5+OOc86vz+7lV2cEeq9ME8bP8h:fpGCoc86vzQhc86vz5

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      e226f4e480e52ae79826b49d0b0f8c54

    • SHA1

      004bd67b8f4733cf6527a66931412d90273f30bd

    • SHA256

      6a9c67ca0847c6e365c8305e49d8cc672fd4191ba319611b95d18e88103ebda8

    • SHA512

      45c9c63383eae1a4593d5da156e0ea505aea3e0faff239cc3ef33502dee391bc612d326e8c8c6d756593f2d114af4d946c1f955eaf6a2e2efaf0d036d1bf1337

    • SSDEEP

      96:fpGgtoc86vzNi/ME8bPUXg5+OOc86vz+7lV2cEeq9ME8bP8h:fpGCoc86vzQhc86vz5

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (1514) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks