General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241205-eyyd8sylf1

  • MD5

    6d3974a5fd8ff376f3a0b86bcff49e6c

  • SHA1

    f810b96e1c7d71031da68a4d5151ae3322ec4d85

  • SHA256

    0a79ce612afe4bc4311eb044aeb2668a2565d5ba2ad2f765a1372b74097b1f1c

  • SHA512

    065fca77f3da8f1fd44d89ac465c7f343b76c0ef4ed6feb4ac178168107d17ed47cec79467ab300ef8be94636ab25d2b7928f581256a277eae7314e2ddb7d645

  • SSDEEP

    192:mEUZiwxY/3Biauh0Um3kfEYsS2GVquJAY4L4n2O14EM2O14ExbEUZiwxMLoauh0o:mEUZiGY/3Bc9c4MEUZiGML+D

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      6d3974a5fd8ff376f3a0b86bcff49e6c

    • SHA1

      f810b96e1c7d71031da68a4d5151ae3322ec4d85

    • SHA256

      0a79ce612afe4bc4311eb044aeb2668a2565d5ba2ad2f765a1372b74097b1f1c

    • SHA512

      065fca77f3da8f1fd44d89ac465c7f343b76c0ef4ed6feb4ac178168107d17ed47cec79467ab300ef8be94636ab25d2b7928f581256a277eae7314e2ddb7d645

    • SSDEEP

      192:mEUZiwxY/3Biauh0Um3kfEYsS2GVquJAY4L4n2O14EM2O14ExbEUZiwxMLoauh0o:mEUZiGY/3Bc9c4MEUZiGML+D

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks