General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241212-er1k1svkgr

  • MD5

    2118fb9c92a7ba630d3685316138e51c

  • SHA1

    2e6e52d7dca81eb572af0190f76c4ae4476163f7

  • SHA256

    13d0ad7de82db15e9f2f462a10ad39d4b2eb12ec1724bf934a88093b10f90c34

  • SHA512

    e4d8fb37070248a12bdd22ef4b1852951590ebd55edcc225d0cf50c918d6ea742e9b026156905a14e2f53fbe6f4d6714aa47615fb10a154e47c82958edd0647d

  • SSDEEP

    96:FcKNpVakr8kEqPLgvHpC8b7PLgvHcBMDIq8yNptcepQ38S/4X:FcGas8ktPLgvHpCqPLgvHiZc/

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      2118fb9c92a7ba630d3685316138e51c

    • SHA1

      2e6e52d7dca81eb572af0190f76c4ae4476163f7

    • SHA256

      13d0ad7de82db15e9f2f462a10ad39d4b2eb12ec1724bf934a88093b10f90c34

    • SHA512

      e4d8fb37070248a12bdd22ef4b1852951590ebd55edcc225d0cf50c918d6ea742e9b026156905a14e2f53fbe6f4d6714aa47615fb10a154e47c82958edd0647d

    • SSDEEP

      96:FcKNpVakr8kEqPLgvHpC8b7PLgvHcBMDIq8yNptcepQ38S/4X:FcGas8ktPLgvHpCqPLgvHiZc/

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (2151) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks