General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241208-zqwwnaypbp

  • MD5

    78db96ee0ac91e7ab493a7c7b6ba585a

  • SHA1

    21c663b006cd230912e46f16c3c935f0a2b61651

  • SHA256

    ec8ab5b1a13f18a2e312d9239f247c63e38f8705a7175cca7b169fb6ff255fe0

  • SHA512

    462395820799b883467094e326d2c4b189518d4b3f0554154d12a0b5497e9695c714d26ac0a250ddc7ace9f8889ccf9e1622d52d84eac89038d781a6c921adef

  • SSDEEP

    192:So70mLEFrIvT0i6AI7Fa2IR8IBGm10r+vT0DAI7Fa2C8IBGmyoH:SA0moyvT0iMiRvT077u

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      78db96ee0ac91e7ab493a7c7b6ba585a

    • SHA1

      21c663b006cd230912e46f16c3c935f0a2b61651

    • SHA256

      ec8ab5b1a13f18a2e312d9239f247c63e38f8705a7175cca7b169fb6ff255fe0

    • SHA512

      462395820799b883467094e326d2c4b189518d4b3f0554154d12a0b5497e9695c714d26ac0a250ddc7ace9f8889ccf9e1622d52d84eac89038d781a6c921adef

    • SSDEEP

      192:So70mLEFrIvT0i6AI7Fa2IR8IBGm10r+vT0DAI7Fa2C8IBGmyoH:SA0moyvT0iMiRvT077u

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (961) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks