General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241212-ewdbaavlgr

  • MD5

    71fd894e884df75bb8af4b31af4f2452

  • SHA1

    17fcf1f0350d13101be46bf84ddca6f806a2d69d

  • SHA256

    057d45e6e805aac585c6a33067ba0a4ca42858f2fdb7ad97958a55fd645b7175

  • SHA512

    ae95231c5087378d2554f145726cd2cd5d130d3126ced8d784def1460c9b5310047b659ff21ad1624e5da11952680f7588830fe6e8b58a77901694266e935daf

  • SSDEEP

    96:YwswcL5Rh8Xq8pVLddQLeOEyKai6UrL3LqkLswT2mgqcgNRnR7RgvHpUA89iJhpI:bcs4uqkDRdgvHpEmRdgvHknoD

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      71fd894e884df75bb8af4b31af4f2452

    • SHA1

      17fcf1f0350d13101be46bf84ddca6f806a2d69d

    • SHA256

      057d45e6e805aac585c6a33067ba0a4ca42858f2fdb7ad97958a55fd645b7175

    • SHA512

      ae95231c5087378d2554f145726cd2cd5d130d3126ced8d784def1460c9b5310047b659ff21ad1624e5da11952680f7588830fe6e8b58a77901694266e935daf

    • SSDEEP

      96:YwswcL5Rh8Xq8pVLddQLeOEyKai6UrL3LqkLswT2mgqcgNRnR7RgvHpUA89iJhpI:bcs4uqkDRdgvHpEmRdgvHknoD

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (1012) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks