General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241202-17cd1s1qdq

  • MD5

    333efe28921c62bc81cebb18d9a6e7d6

  • SHA1

    de7c7c8d358a6d4ac49add9902ee77a9ebccfc66

  • SHA256

    0b484ebad0fae0be292db02d72f87470f7fe3e013ae3ef4d79d8795357b3fcf8

  • SHA512

    a148117669ec67c429297926d0e4d7ade365437adb2faf2e26870e00230c87f1e2914f06a7f445a4e2edc2afd678875c5aa7fdeda0061109994feeb4aef0bcb2

  • SSDEEP

    192:9MhNqbWTzY0aowDWJ1phC2Gt1gphWaQ7Ti++00SB141pb++EowDWJ1xhN8YTzYx5:yhNqbKaowDWJ1pXphWaQ7Ti+G1pb++E5

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      333efe28921c62bc81cebb18d9a6e7d6

    • SHA1

      de7c7c8d358a6d4ac49add9902ee77a9ebccfc66

    • SHA256

      0b484ebad0fae0be292db02d72f87470f7fe3e013ae3ef4d79d8795357b3fcf8

    • SHA512

      a148117669ec67c429297926d0e4d7ade365437adb2faf2e26870e00230c87f1e2914f06a7f445a4e2edc2afd678875c5aa7fdeda0061109994feeb4aef0bcb2

    • SSDEEP

      192:9MhNqbWTzY0aowDWJ1phC2Gt1gphWaQ7Ti++00SB141pb++EowDWJ1xhN8YTzYx5:yhNqbKaowDWJ1pXphWaQ7Ti+G1pb++E5

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks