General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241213-xg1r5sypfl

  • MD5

    00ea8ab56ae0618eac71fb0a7564f353

  • SHA1

    c4fa5a7e2f7190352bae1e3a5c31fb9100452c82

  • SHA256

    c611d4a177a305017c6465efb671671ac948918db9b852e07b2220f59d5e1f63

  • SHA512

    275a29e0e3bf5b9beeb9601d18009cbc95162c39cb01c94c16d3c8a1450368752dc4d4901c13f3257dc8f5627acd777de320b1b3aa3217ee0c4fd7ae33f9b199

  • SSDEEP

    192:sZ1wlFtg6qr6DJJIhZBBt1vJvVvov9vlvT2Z1wlF06qtUJJIh9DvJvVvov9vlv/:sZ1wlFtg6qr6MBTW2Z1wlF06qty

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      00ea8ab56ae0618eac71fb0a7564f353

    • SHA1

      c4fa5a7e2f7190352bae1e3a5c31fb9100452c82

    • SHA256

      c611d4a177a305017c6465efb671671ac948918db9b852e07b2220f59d5e1f63

    • SHA512

      275a29e0e3bf5b9beeb9601d18009cbc95162c39cb01c94c16d3c8a1450368752dc4d4901c13f3257dc8f5627acd777de320b1b3aa3217ee0c4fd7ae33f9b199

    • SSDEEP

      192:sZ1wlFtg6qr6DJJIhZBBt1vJvVvov9vlvT2Z1wlF06qtUJJIh9DvJvVvov9vlv/:sZ1wlFtg6qr6MBTW2Z1wlF06qty

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (2128) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks