General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241213-fczwlszrak

  • MD5

    fd887cf134f1bafd856ce79880793923

  • SHA1

    499507dca66328b55086f71470e3decc5f4d603e

  • SHA256

    9b38762240fdcad8eca7d316a41e7655884cc88fb6fd7a1bde148db81c8ccff9

  • SHA512

    1b56f85dd2bd5dc44321c6c6ce3e8f463af23cf4236181cb28ddaa81e28419e215315ba227cc8b4eec30804287fca92cc350ead72a7f69530c85d0c9c4dc8270

  • SSDEEP

    96:YDKDCDd+qhRe3eLeTAYoj/BmWxaJhSU2m8L99CLFhFZFUBtILaSULyK3D1V46yLV:3OKTAYeX+ds36wL/OKTAYI

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      fd887cf134f1bafd856ce79880793923

    • SHA1

      499507dca66328b55086f71470e3decc5f4d603e

    • SHA256

      9b38762240fdcad8eca7d316a41e7655884cc88fb6fd7a1bde148db81c8ccff9

    • SHA512

      1b56f85dd2bd5dc44321c6c6ce3e8f463af23cf4236181cb28ddaa81e28419e215315ba227cc8b4eec30804287fca92cc350ead72a7f69530c85d0c9c4dc8270

    • SSDEEP

      96:YDKDCDd+qhRe3eLeTAYoj/BmWxaJhSU2m8L99CLFhFZFUBtILaSULyK3D1V46yLV:3OKTAYeX+ds36wL/OKTAYI

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1831) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks