General

  • Target

    UUA29_bins.sh

  • Size

    10KB

  • Sample

    241202-skv9lsyqfy

  • MD5

    436845a459c71b19ac21070d4569df28

  • SHA1

    3ae505085c1bad8560b465ce273cbf1acf86e6da

  • SHA256

    703bc61dabb824da3d539d16dc77e4524c08eda72faa12e17fda26395f4360a8

  • SHA512

    82c2920b53776fa210d9c01eb1a2ec4a246466b3ffa34de150e6d1e42e1b4045f09e41cd774739dac237208a820cf1df7e9248576acf56ecd32735654c5a16e3

  • SSDEEP

    192:jo9H3HvHt2qYr7reSUZF6pRVLWW8qiSRVLWW+qiFH3HvHt2qKr7reSwk:jo9XPtF6yqihqiFXPU

Malware Config

Targets

    • Target

      UUA29_bins.sh

    • Size

      10KB

    • MD5

      436845a459c71b19ac21070d4569df28

    • SHA1

      3ae505085c1bad8560b465ce273cbf1acf86e6da

    • SHA256

      703bc61dabb824da3d539d16dc77e4524c08eda72faa12e17fda26395f4360a8

    • SHA512

      82c2920b53776fa210d9c01eb1a2ec4a246466b3ffa34de150e6d1e42e1b4045f09e41cd774739dac237208a820cf1df7e9248576acf56ecd32735654c5a16e3

    • SSDEEP

      192:jo9H3HvHt2qYr7reSUZF6pRVLWW8qiSRVLWW+qiFH3HvHt2qKr7reSwk:jo9XPtF6yqihqiFXPU

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (739) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks