General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241213-z7wl8azqfq

  • MD5

    7c06e835a83b81914ba9a19c15e66d76

  • SHA1

    bc618204890c0b179a00d6d253001a6e27197aa1

  • SHA256

    cf982818df24e8535c11ddeee9410d1545a54203538acf160c505dcb7ad1cbeb

  • SHA512

    4bbe783a5be8061d432c7a90b941059b63a1adc687741621537fbde9f2631c045bccb8ef3d0fcbb9aac75dd15f9ab949678fd3c6b879b3e4ba7d74b585e5f9d2

  • SSDEEP

    192:IWWlW1WGWfWLWqVl9MT3rtdp2n3Viuz3WdNdGmX4spz3WdN8X4mWlW1WGWfWLWVh:jAtdp2n3Vi9GOMdp2n3Fu

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      7c06e835a83b81914ba9a19c15e66d76

    • SHA1

      bc618204890c0b179a00d6d253001a6e27197aa1

    • SHA256

      cf982818df24e8535c11ddeee9410d1545a54203538acf160c505dcb7ad1cbeb

    • SHA512

      4bbe783a5be8061d432c7a90b941059b63a1adc687741621537fbde9f2631c045bccb8ef3d0fcbb9aac75dd15f9ab949678fd3c6b879b3e4ba7d74b585e5f9d2

    • SSDEEP

      192:IWWlW1WGWfWLWqVl9MT3rtdp2n3Viuz3WdNdGmX4spz3WdN8X4mWlW1WGWfWLWVh:jAtdp2n3Vi9GOMdp2n3Fu

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1986) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks