General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241211-c61hfsslex

  • MD5

    c3f019a7352fe8f83f6e1dc7cfe4cc11

  • SHA1

    46878d89421696772fb817f1ab2c3da137b30002

  • SHA256

    9faabe01ff89b4a68e68ac5fded815e7a1574057482f7ed301b94feb9cbb1e52

  • SHA512

    f1ba2cce684b38f648a4ef5e5a92ab414b7d8687d4da0be9dd658cef9527fb8516db95955aa56c9e138a274d00362250a387d85fbe4576713debc0c6cbecf58e

  • SSDEEP

    96:YlFpLokYL6yQMrMHMJ9GWeDEDIDD+WBLvDHNNNNNuF5jL990LDfBVrVHVGXHlUjg:p4y8HJ1GXHlTwg01o0J1GXHDwgs1E

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      c3f019a7352fe8f83f6e1dc7cfe4cc11

    • SHA1

      46878d89421696772fb817f1ab2c3da137b30002

    • SHA256

      9faabe01ff89b4a68e68ac5fded815e7a1574057482f7ed301b94feb9cbb1e52

    • SHA512

      f1ba2cce684b38f648a4ef5e5a92ab414b7d8687d4da0be9dd658cef9527fb8516db95955aa56c9e138a274d00362250a387d85fbe4576713debc0c6cbecf58e

    • SSDEEP

      96:YlFpLokYL6yQMrMHMJ9GWeDEDIDD+WBLvDHNNNNNuF5jL990LDfBVrVHVGXHlUjg:p4y8HJ1GXHlTwg01o0J1GXHDwgs1E

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

MITRE ATT&CK Enterprise v15

Tasks