General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241212-kwky1s1nbm

  • MD5

    81b981f0e0533e164db19e0c90fba8ba

  • SHA1

    16f1842f33d2fb0c0f40fd35b485ff0ec2871af3

  • SHA256

    11b02fb187742a03802256f3467e069a4b96fc8116a714a2c35ad3659d9b5e96

  • SHA512

    3d45511baec1e8e6d2d8c8a03d4378379107943bd44389bcf25b296057f0a145ecdaa35b21faeabef83da8c1e854a40f479cf8d549171bbfa6b38eaf8f09396a

  • SSDEEP

    192:ABBSpd+4B1QHn5IOM3NKuQ+B1QHnTWkKuHBBSpdP:HB1QHn5IOM3NKuQ+B1QHnSkKuk

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      81b981f0e0533e164db19e0c90fba8ba

    • SHA1

      16f1842f33d2fb0c0f40fd35b485ff0ec2871af3

    • SHA256

      11b02fb187742a03802256f3467e069a4b96fc8116a714a2c35ad3659d9b5e96

    • SHA512

      3d45511baec1e8e6d2d8c8a03d4378379107943bd44389bcf25b296057f0a145ecdaa35b21faeabef83da8c1e854a40f479cf8d549171bbfa6b38eaf8f09396a

    • SSDEEP

      192:ABBSpd+4B1QHn5IOM3NKuQ+B1QHnTWkKuHBBSpdP:HB1QHn5IOM3NKuQ+B1QHnSkKuk

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (2226) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks