General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241210-m4ajcsyndp

  • MD5

    2cb62c12f7b74b008f2d2fe409ccfe5d

  • SHA1

    06bdad09642ff840259f813a0fd9fc348a58b76d

  • SHA256

    9a1fe6336b9891af1c5f6e09f6de24ac6aaf11c273b36380e10a8b41ca8bc349

  • SHA512

    b11226d6f0d4244e5e88379ed0e86a4dcadfeae59d3d59be80eb52e4f503e4167a497c1f063993bc932876323aa05770dcb52fc561896b47c7e599297f145277

  • SSDEEP

    96:YDUdDUdDUAU7UHUQO+P99Eo1VELttJLr7rXroXB5jFDfipBrLFlqUyKSLBGB2BfA:PfhyU6t8ckH

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      2cb62c12f7b74b008f2d2fe409ccfe5d

    • SHA1

      06bdad09642ff840259f813a0fd9fc348a58b76d

    • SHA256

      9a1fe6336b9891af1c5f6e09f6de24ac6aaf11c273b36380e10a8b41ca8bc349

    • SHA512

      b11226d6f0d4244e5e88379ed0e86a4dcadfeae59d3d59be80eb52e4f503e4167a497c1f063993bc932876323aa05770dcb52fc561896b47c7e599297f145277

    • SSDEEP

      96:YDUdDUdDUAU7UHUQO+P99Eo1VELttJLr7rXroXB5jFDfipBrLFlqUyKSLBGB2BfA:PfhyU6t8ckH

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (1801) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks