General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241213-bncs1avrhq

  • MD5

    3fe1d93978889125187bf6257ed4f4b0

  • SHA1

    2caea9d4054f5a3db375f99f3082455c44c54f3d

  • SHA256

    1392fcc4ade3ce91fb8ec1da708b895f525b232c6f1888ad2eeacfe1bbf28021

  • SHA512

    bcd16208ec0aa99c4797b0ae9384922ffe2a5c6169cd1d8aef33454e3c4c6ec50edfeb883886a5aa254d744b03740ae50981472ec24b441e7cbe07ddd1b66a36

  • SSDEEP

    192:4F8yRERYRlSyCOemmBVZah5zVZah5m10RERYRlSyx:4F8JOemm+1A

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      3fe1d93978889125187bf6257ed4f4b0

    • SHA1

      2caea9d4054f5a3db375f99f3082455c44c54f3d

    • SHA256

      1392fcc4ade3ce91fb8ec1da708b895f525b232c6f1888ad2eeacfe1bbf28021

    • SHA512

      bcd16208ec0aa99c4797b0ae9384922ffe2a5c6169cd1d8aef33454e3c4c6ec50edfeb883886a5aa254d744b03740ae50981472ec24b441e7cbe07ddd1b66a36

    • SSDEEP

      192:4F8yRERYRlSyCOemmBVZah5zVZah5m10RERYRlSyx:4F8JOemm+1A

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (2145) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks