General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241204-a6nsjsylcp

  • MD5

    f05da6a5f1c558bd14134bace343c53b

  • SHA1

    802bad5f79db08727638201f735df65f813a3d71

  • SHA256

    ab9cf57b69b0f3988a832c77e08ee2799b5e1623bf927cc77f48879aae9fc01e

  • SHA512

    131f0a3d6c279ba5c6bfc52032768bd4e67ac9c6852f05de87e97b8028c2c02467e4d78b9afbbc2c859779007ec3d3f2b14df504c6f378785a27666b65126817

  • SSDEEP

    192:IF6LkGoyxtdO2TFTFhjxDYQ4E8N9tquGiRN9tquEhjxDYQ7FvFTvTxtdO2V:I8LkGoyxtdO2TFTFhjxDYQ4E8N9tquGv

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      f05da6a5f1c558bd14134bace343c53b

    • SHA1

      802bad5f79db08727638201f735df65f813a3d71

    • SHA256

      ab9cf57b69b0f3988a832c77e08ee2799b5e1623bf927cc77f48879aae9fc01e

    • SHA512

      131f0a3d6c279ba5c6bfc52032768bd4e67ac9c6852f05de87e97b8028c2c02467e4d78b9afbbc2c859779007ec3d3f2b14df504c6f378785a27666b65126817

    • SSDEEP

      192:IF6LkGoyxtdO2TFTFhjxDYQ4E8N9tquGiRN9tquEhjxDYQ7FvFTvTxtdO2V:I8LkGoyxtdO2TFTFhjxDYQ4E8N9tquGv

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (1739) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks