General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241204-mjrl5sspgz

  • MD5

    9233bf649a4624ec647262c74da69bec

  • SHA1

    345be1eaa98aba4c1ff55ad977ea48281e6b60c3

  • SHA256

    bd6cd721c42874cb2242e64bcc17ab58442d0de2ca5302438b17712d83839942

  • SHA512

    285bf6e13dec59ea4792dd4b47b82cb53afe423ec49e009f716b2f6b6c4e9f28367ae08b4eb791fafae5f239a432c95e870562eb09fa24a3cb8237b657c85013

  • SSDEEP

    96:/Ro+uSOePnaUgRdP4/EA4f/sUyyY7/Mc/k9/O/EA4f/aUyyY7//DgfRo+u7SOePQ:/uSOePnaVKLUyyY7/iyyY7/7SOePnQ

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      9233bf649a4624ec647262c74da69bec

    • SHA1

      345be1eaa98aba4c1ff55ad977ea48281e6b60c3

    • SHA256

      bd6cd721c42874cb2242e64bcc17ab58442d0de2ca5302438b17712d83839942

    • SHA512

      285bf6e13dec59ea4792dd4b47b82cb53afe423ec49e009f716b2f6b6c4e9f28367ae08b4eb791fafae5f239a432c95e870562eb09fa24a3cb8237b657c85013

    • SSDEEP

      96:/Ro+uSOePnaUgRdP4/EA4f/sUyyY7/Mc/k9/O/EA4f/aUyyY7//DgfRo+u7SOePQ:/uSOePnaVKLUyyY7/iyyY7/7SOePnQ

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (804) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks