General
-
Target
bins.sh
-
Size
10KB
-
Sample
241212-jjn98sypfl
-
MD5
9ed9f3021c8dcb7e35e7c5b0d692edea
-
SHA1
3ab0b7180b490607c695f4424e45c4c84041c2c7
-
SHA256
60b72f62269d0f3e87ac09f6bcb81c16691c11c9e6a2c19859814332e6da4383
-
SHA512
afa8f548d73c1acf1c647fccd1dae9b3c594e711b8d7c1f3515b38b27b03eeda4b8e4404f2f89f2b99ac7fcac7487c7cb8056d9275300c96726e5dc1c55b0220
-
SSDEEP
192:QfrG49AA34EjbzR5Fn5w5lLqAA34E3F5Fn5w5lL2rS:QC49AA34Ejbz9AA34E3K
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240729-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240611-en
Malware Config
Targets
-
-
Target
bins.sh
-
Size
10KB
-
MD5
9ed9f3021c8dcb7e35e7c5b0d692edea
-
SHA1
3ab0b7180b490607c695f4424e45c4c84041c2c7
-
SHA256
60b72f62269d0f3e87ac09f6bcb81c16691c11c9e6a2c19859814332e6da4383
-
SHA512
afa8f548d73c1acf1c647fccd1dae9b3c594e711b8d7c1f3515b38b27b03eeda4b8e4404f2f89f2b99ac7fcac7487c7cb8056d9275300c96726e5dc1c55b0220
-
SSDEEP
192:QfrG49AA34EjbzR5Fn5w5lLqAA34E3F5Fn5w5lL2rS:QC49AA34Ejbz9AA34E3K
-
Xorbot family
-
Contacts a large (2212) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Renames itself
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1