General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241213-qr3k6azmbs

  • MD5

    32835554d3957d1a105ec5baf37e988b

  • SHA1

    3fba9b0bbb41d8b28229d7db7d99272ef276875c

  • SHA256

    f5dda6bcf23d1c9771b5f6c56238ee8c753fd2a53d526e82881736f3e3ca8b54

  • SHA512

    ad0c5a0511a7f8314c9b3da3c1f9536ca95d5467961bb2d1be246f6f454f2ddc5dbb9e9cb0f6cddbae101faa6a0dd292db11299c13ca09d2f74e2290cbd019f1

  • SSDEEP

    192:zFwUBGOb1O5v3QNJBcu9NCwUBGOPv3QNJE9NU:zv1O8cu9N49NU

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      32835554d3957d1a105ec5baf37e988b

    • SHA1

      3fba9b0bbb41d8b28229d7db7d99272ef276875c

    • SHA256

      f5dda6bcf23d1c9771b5f6c56238ee8c753fd2a53d526e82881736f3e3ca8b54

    • SHA512

      ad0c5a0511a7f8314c9b3da3c1f9536ca95d5467961bb2d1be246f6f454f2ddc5dbb9e9cb0f6cddbae101faa6a0dd292db11299c13ca09d2f74e2290cbd019f1

    • SSDEEP

      192:zFwUBGOb1O5v3QNJBcu9NCwUBGOPv3QNJE9NU:zv1O8cu9N49NU

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (1692) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks