General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241202-lvrwlswkcn

  • MD5

    1c34c22f6ec5a232b2737aef798df9bd

  • SHA1

    2bca089a2af1b83756cb67569281bee4451083ec

  • SHA256

    46319faf78e53f1182764f6bee7b5bbb790eb5b0c554de78b23e2362f7e49ef0

  • SHA512

    cc1c59ac10a2231a80d6b904204018c277baa5d9bf1e786340a0f9bf1464c075c185b11b022f50e89d357ff1a0f68ad6eb4b84fbdc03789d861821866b618d47

  • SSDEEP

    192:rHHJy9rgUE/3wkUEHD/SaldVGKykUEHDEUldVGKuVkgUE/3G:rHpy9rgUE/3N7ldVGKbldVGKuCgUE/3G

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      1c34c22f6ec5a232b2737aef798df9bd

    • SHA1

      2bca089a2af1b83756cb67569281bee4451083ec

    • SHA256

      46319faf78e53f1182764f6bee7b5bbb790eb5b0c554de78b23e2362f7e49ef0

    • SHA512

      cc1c59ac10a2231a80d6b904204018c277baa5d9bf1e786340a0f9bf1464c075c185b11b022f50e89d357ff1a0f68ad6eb4b84fbdc03789d861821866b618d47

    • SSDEEP

      192:rHHJy9rgUE/3wkUEHD/SaldVGKykUEHDEUldVGKuVkgUE/3G:rHpy9rgUE/3N7ldVGKbldVGKuCgUE/3G

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1915) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks