General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241209-cf1ersspbr

  • MD5

    aae52af0f514c2d01b4bbe42d1530ed4

  • SHA1

    9172c43a3fee4ae7b0c4cd0a09c5d502e74f8daa

  • SHA256

    36354b4621b1a65b3b9e49f4f28de6a36f86f23922d692a1a336b636c45ab54d

  • SHA512

    b1d06580eab7de00cc283855823e0a9b59a041f3662e57a12c51119cb5bc44b461afef1fd1f367a70c3d62c70c975e0cfa3097f6ea3e2125c3e24308fa6f68b1

  • SSDEEP

    192:g+2dEIrV0iHgc1R+WsKQNAkBGu09gc1R+W6AkBGu2+2dEI2:GV0i92KQNAkBGu0TIAkBGuF

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      aae52af0f514c2d01b4bbe42d1530ed4

    • SHA1

      9172c43a3fee4ae7b0c4cd0a09c5d502e74f8daa

    • SHA256

      36354b4621b1a65b3b9e49f4f28de6a36f86f23922d692a1a336b636c45ab54d

    • SHA512

      b1d06580eab7de00cc283855823e0a9b59a041f3662e57a12c51119cb5bc44b461afef1fd1f367a70c3d62c70c975e0cfa3097f6ea3e2125c3e24308fa6f68b1

    • SSDEEP

      192:g+2dEIrV0iHgc1R+WsKQNAkBGu09gc1R+W6AkBGu2+2dEI2:GV0i92KQNAkBGu0TIAkBGuF

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks