General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241211-mgcefaymbt

  • MD5

    406a3ef5ca0b6741cfdb93766923811c

  • SHA1

    75979edb2e57be5b492da50ba893a293884b0cd5

  • SHA256

    0aaeab657bd005ba7caabd00e43d1f0504cc0705a29110166cc9ce7710f1586b

  • SHA512

    3e57c0814fcb99dce5a1c6884654a6a987348721734070e55a0a273e23b20e770c517aa0ceeec53a8fb07f51b6499f49cefdf05a2e9bd28c174d7001e44b776d

  • SSDEEP

    192:dO28yspdcnHXWnh9CnPOUsKh9CnPsAv0pdcnHX4:dOHyspdcnHmnh9CnPOUsKh9CnPsA8pd7

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      406a3ef5ca0b6741cfdb93766923811c

    • SHA1

      75979edb2e57be5b492da50ba893a293884b0cd5

    • SHA256

      0aaeab657bd005ba7caabd00e43d1f0504cc0705a29110166cc9ce7710f1586b

    • SHA512

      3e57c0814fcb99dce5a1c6884654a6a987348721734070e55a0a273e23b20e770c517aa0ceeec53a8fb07f51b6499f49cefdf05a2e9bd28c174d7001e44b776d

    • SSDEEP

      192:dO28yspdcnHXWnh9CnPOUsKh9CnPsAv0pdcnHX4:dOHyspdcnHmnh9CnPOUsKh9CnPsA8pd7

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (896) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks