General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241205-lx3e5avper

  • MD5

    b9ff5b6149c58df263d8f141e0b77796

  • SHA1

    35d3e572ad9c8e240735e5370d51e21378d956ec

  • SHA256

    c786d621a56d04074050008e01cd677559d6275f24b15138bcbb94124c1b1a4d

  • SHA512

    820119d559fcdcb0f9e41b7e1d7b5ee4107d3d67b2056a2ab128847fa4d8dd4390afc319dd2757210986459d8a7ea6aa856457815c2f8cb4f4758ef8e3f39ca5

  • SSDEEP

    96:YyKbl04JKhKZKGLLzPxwTvELqiuLuen9V919GNhvXXbXCWCa+OLeXQeX7tUxpoLd:2t5Xu6LCSGbFmWY5puLCGhmWYjC

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      b9ff5b6149c58df263d8f141e0b77796

    • SHA1

      35d3e572ad9c8e240735e5370d51e21378d956ec

    • SHA256

      c786d621a56d04074050008e01cd677559d6275f24b15138bcbb94124c1b1a4d

    • SHA512

      820119d559fcdcb0f9e41b7e1d7b5ee4107d3d67b2056a2ab128847fa4d8dd4390afc319dd2757210986459d8a7ea6aa856457815c2f8cb4f4758ef8e3f39ca5

    • SSDEEP

      96:YyKbl04JKhKZKGLLzPxwTvELqiuLuen9V919GNhvXXbXCWCa+OLeXQeX7tUxpoLd:2t5Xu6LCSGbFmWY5puLCGhmWYjC

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks