General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241202-h1hncavmbs

  • MD5

    0d2c2bba48d2650adc694e38c0ad363a

  • SHA1

    fa930798d5511e7d5bf147b6f4e43bcac6e2d2d3

  • SHA256

    052180cf83663519a84b6600bcf33de2cd382c9ddf58e63f4410406d9bb18dbd

  • SHA512

    509d5fc4d8fe3d00857fa23ca093204655f5670dda7ffb38ccc9361f767985830c9134525a6de4434feb2947d254ea4fc8e0f6546337919ba0833b819ea65739

  • SSDEEP

    192:Fn6ODAYLhaZ52QM0eitMEgGUWq5oAyfXM52QMEeitME8tS5oAyfXJ6ODAYO:Fn6ODAYLhMwQMDGUWgwQMz16ODAYO

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      0d2c2bba48d2650adc694e38c0ad363a

    • SHA1

      fa930798d5511e7d5bf147b6f4e43bcac6e2d2d3

    • SHA256

      052180cf83663519a84b6600bcf33de2cd382c9ddf58e63f4410406d9bb18dbd

    • SHA512

      509d5fc4d8fe3d00857fa23ca093204655f5670dda7ffb38ccc9361f767985830c9134525a6de4434feb2947d254ea4fc8e0f6546337919ba0833b819ea65739

    • SSDEEP

      192:Fn6ODAYLhaZ52QM0eitMEgGUWq5oAyfXM52QMEeitME8tS5oAyfXJ6ODAYO:Fn6ODAYLhMwQMDGUWgwQMz16ODAYO

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks