General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241212-e8th2avqaj

  • MD5

    8cab91d74fe1bb8374174a7f06c9cd6b

  • SHA1

    fc8c136c5d101f55918249ab3388135d41edd392

  • SHA256

    4607d2917d96f7de031a394de3c6a46984e2b9928838a8ae56fe60541db6ed45

  • SHA512

    54b91c578720a9a003e315992194b4359e219b0b72f0a3f02cc75f34d4459771082debc57c57768031db99bd388a4f2f08c1dd96d44102a4f2e3d48680b75fb0

  • SSDEEP

    96:dc6PpVuwrMkscj3gvHpSOnnj3gvHcnM/iqWePptY8ra3MStOX:dcgugMk7j3gvHpSYj3gvHyT2L

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      8cab91d74fe1bb8374174a7f06c9cd6b

    • SHA1

      fc8c136c5d101f55918249ab3388135d41edd392

    • SHA256

      4607d2917d96f7de031a394de3c6a46984e2b9928838a8ae56fe60541db6ed45

    • SHA512

      54b91c578720a9a003e315992194b4359e219b0b72f0a3f02cc75f34d4459771082debc57c57768031db99bd388a4f2f08c1dd96d44102a4f2e3d48680b75fb0

    • SSDEEP

      96:dc6PpVuwrMkscj3gvHpSOnnj3gvHcnM/iqWePptY8ra3MStOX:dcgugMk7j3gvHpSYj3gvHyT2L

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (2245) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Unexpected DNS network traffic destination

      Network traffic to other servers than the configured DNS servers was detected on the DNS port.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks