General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241213-typveswkfp

  • MD5

    463d40b16cad606abb2ee5f790a95485

  • SHA1

    37b9e2b09a0e3845e35c7253dd9b3a34218760d5

  • SHA256

    c509c573c529265705568c813e7fc574c747aa0e20d793a8ed7ceab7858120a1

  • SHA512

    2aa4e7fc1db951e89888ce7cc9846c7a618e64ce30db24177ee13397ed06188213b7a75bab118c8682c03d0dfa0158918840bd82ced984632be702edf7116a22

  • SSDEEP

    192:QX34fzQeK1CiaZhahloYFDVmZRKx1EYZDOlAo9os9Ao9osgX34fzqeK1CimZhah2:QX34fzxYFxmZRrYZOYX34fzKFxmZRV

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      463d40b16cad606abb2ee5f790a95485

    • SHA1

      37b9e2b09a0e3845e35c7253dd9b3a34218760d5

    • SHA256

      c509c573c529265705568c813e7fc574c747aa0e20d793a8ed7ceab7858120a1

    • SHA512

      2aa4e7fc1db951e89888ce7cc9846c7a618e64ce30db24177ee13397ed06188213b7a75bab118c8682c03d0dfa0158918840bd82ced984632be702edf7116a22

    • SSDEEP

      192:QX34fzQeK1CiaZhahloYFDVmZRKx1EYZDOlAo9os9Ao9osgX34fzqeK1CimZhah2:QX34fzxYFxmZRrYZOYX34fzKFxmZRV

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (2202) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks