General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241213-dpk7waymbr

  • MD5

    dfe78d211dfda61d6a6fa505046c4098

  • SHA1

    71ef59b5113a863960b551950198d1877bdc682b

  • SHA256

    c104612f1cba06d9ef4ed469b872d767539db39798ab511f72b02b0692733fe0

  • SHA512

    5692cd60168a981c2856da5dce1ebc71bfb782b6c9b862e35e7293d89f2d44ea199f036a9aad03442a262c831915a9cbe13349dacb80bc0a4ea8bf1a622e6ba0

  • SSDEEP

    192:aaG9uWkCI7UTW6SehOOc8KRKtKCKdK1K4s4tSehOOcQKRKtKCKdK1KtaG9uWF:hCIwTWtzU4xIw4XU/U4xIwZ

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      dfe78d211dfda61d6a6fa505046c4098

    • SHA1

      71ef59b5113a863960b551950198d1877bdc682b

    • SHA256

      c104612f1cba06d9ef4ed469b872d767539db39798ab511f72b02b0692733fe0

    • SHA512

      5692cd60168a981c2856da5dce1ebc71bfb782b6c9b862e35e7293d89f2d44ea199f036a9aad03442a262c831915a9cbe13349dacb80bc0a4ea8bf1a622e6ba0

    • SSDEEP

      192:aaG9uWkCI7UTW6SehOOc8KRKtKCKdK1K4s4tSehOOcQKRKtKCKdK1KtaG9uWF:hCIwTWtzU4xIw4XU/U4xIwZ

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (2157) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks