General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241203-kang1ssphq

  • MD5

    cf70d58f95757ee8960c21dc3c7551eb

  • SHA1

    0c40b1cd7245f052bf82533610cb2d05b9ed349f

  • SHA256

    3d0da0f02fc31c2ea115a328dc878c8b41ff796faab9348025f38520d6ddb315

  • SHA512

    5eacf2de8727fc9fc5e44885fcb310e06826869079d0e8fdf752cbe4eab4cb7403f261657a15c31279eb0e14411b4c03ba0054c45d6c54ea60c4cb538ddf7941

  • SSDEEP

    192:0VdnWFAfPfLfluf6B2Ik8VF+UIk8VFFfPfLfluf6RL:0VdnWF0aDL

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      cf70d58f95757ee8960c21dc3c7551eb

    • SHA1

      0c40b1cd7245f052bf82533610cb2d05b9ed349f

    • SHA256

      3d0da0f02fc31c2ea115a328dc878c8b41ff796faab9348025f38520d6ddb315

    • SHA512

      5eacf2de8727fc9fc5e44885fcb310e06826869079d0e8fdf752cbe4eab4cb7403f261657a15c31279eb0e14411b4c03ba0054c45d6c54ea60c4cb538ddf7941

    • SSDEEP

      192:0VdnWFAfPfLfluf6B2Ik8VF+UIk8VFFfPfLfluf6RL:0VdnWF0aDL

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (2051) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.