General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241212-lhlttszlbt

  • MD5

    d9c5ecf53582d54e3c4f74db94c2cc76

  • SHA1

    1b7e2152c3d18381cbe279a7399eba52c0691b92

  • SHA256

    6852034dc2e7fa3f368524234620d4b3a72ace80e5bd10daf4fd07b84b6f2865

  • SHA512

    26af7fd4ab78a920937e4f87e9e8c7f07376402467a4b36f516c7923001aec5b70983367b9f32f49779cfd1991863b1d3edb14092b54da700c76dd431be60487

  • SSDEEP

    192:EvvSpdIOFJQHnrqAK3PeCQ6FJQHnhYueClvvSpdP:JFJQHnrqAK3PeCQ6FJQHnqueCG

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      d9c5ecf53582d54e3c4f74db94c2cc76

    • SHA1

      1b7e2152c3d18381cbe279a7399eba52c0691b92

    • SHA256

      6852034dc2e7fa3f368524234620d4b3a72ace80e5bd10daf4fd07b84b6f2865

    • SHA512

      26af7fd4ab78a920937e4f87e9e8c7f07376402467a4b36f516c7923001aec5b70983367b9f32f49779cfd1991863b1d3edb14092b54da700c76dd431be60487

    • SSDEEP

      192:EvvSpdIOFJQHnrqAK3PeCQ6FJQHnhYueClvvSpdP:JFJQHnrqAK3PeCQ6FJQHnqueCG

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (1515) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks