General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241213-e2hsyszner

  • MD5

    30a49c0d7783fed3c1ddfe7e96376294

  • SHA1

    048cc5705f31ea4b532bbe0c1f34494c56b8ed11

  • SHA256

    ca03e417a55bb32e06dda9aab01e8dad0479d95c1e8c0b4469ce3bb5962bb977

  • SHA512

    da80c9bb93e64c53aa186afe6c4f25141aaad2b78888d13cdde1b63484cf71898bed2a8d7de304c7851c6b01605a5a0a30bdc5abadb5d38476ca5089798182ab

  • SSDEEP

    96:QW+d+qhikoTAYipJ0/JBUBtI+lOegCFRKR/JBUBt+IlTc9W+d+qhVokoTAYWjb0m:LkoTAY4J0f+lO2dRkoTAY+

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      30a49c0d7783fed3c1ddfe7e96376294

    • SHA1

      048cc5705f31ea4b532bbe0c1f34494c56b8ed11

    • SHA256

      ca03e417a55bb32e06dda9aab01e8dad0479d95c1e8c0b4469ce3bb5962bb977

    • SHA512

      da80c9bb93e64c53aa186afe6c4f25141aaad2b78888d13cdde1b63484cf71898bed2a8d7de304c7851c6b01605a5a0a30bdc5abadb5d38476ca5089798182ab

    • SSDEEP

      96:QW+d+qhikoTAYipJ0/JBUBtI+lOegCFRKR/JBUBt+IlTc9W+d+qhVokoTAYWjb0m:LkoTAY4J0f+lO2dRkoTAY+

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (2138) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks