General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241213-16bfbs1qaq

  • MD5

    f7fefcfa0bcd518582eb4bf6d78b1dd1

  • SHA1

    abab64907400cdd62b54338ee09c745f9004b37c

  • SHA256

    28c69af3cd8738b494e4e75d1b590f5fb533c9819839b9cca3e4285a12b4c587

  • SHA512

    de0f7501f7f8d79fb9bd2c4602c96d1cd42dd34cf6064ae007810df391523fb30f23061faa6cef94b017f0d60d6c2652dd365589f4e2d7ab6e3f09703dc981c8

  • SSDEEP

    192:r0yYjyjWjXCCsmHjsz75YV0c/jyjWjXCCBHjsz7AA:r1YGiQ7YV06GiBA

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      f7fefcfa0bcd518582eb4bf6d78b1dd1

    • SHA1

      abab64907400cdd62b54338ee09c745f9004b37c

    • SHA256

      28c69af3cd8738b494e4e75d1b590f5fb533c9819839b9cca3e4285a12b4c587

    • SHA512

      de0f7501f7f8d79fb9bd2c4602c96d1cd42dd34cf6064ae007810df391523fb30f23061faa6cef94b017f0d60d6c2652dd365589f4e2d7ab6e3f09703dc981c8

    • SSDEEP

      192:r0yYjyjWjXCCsmHjsz75YV0c/jyjWjXCCBHjsz7AA:r1YGiQ7YV06GiBA

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1701) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks