General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241214-gw3x2stnhs

  • MD5

    8c4ec26a71dae92228b8752a76ff0807

  • SHA1

    b9b1cfe562af1adccbb35db7cb16739b1a7260bc

  • SHA256

    46d7518b34c288f55ae7580966a9d006982a8bba5cde44d3fec36f917b7faf13

  • SHA512

    798ac5b1af0513a8d1335e65885797c8cf3dc30537c9d544cd97142a1154989f4cbbb2c6cce77ccbe9b2c5585a22112e786ca1d9cedf78f92b8053f70472e901

  • SSDEEP

    192:MljeI+XjC5RwL7KptMFAXjC5RUL7Kpt+M:MljeI2l

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      8c4ec26a71dae92228b8752a76ff0807

    • SHA1

      b9b1cfe562af1adccbb35db7cb16739b1a7260bc

    • SHA256

      46d7518b34c288f55ae7580966a9d006982a8bba5cde44d3fec36f917b7faf13

    • SHA512

      798ac5b1af0513a8d1335e65885797c8cf3dc30537c9d544cd97142a1154989f4cbbb2c6cce77ccbe9b2c5585a22112e786ca1d9cedf78f92b8053f70472e901

    • SSDEEP

      192:MljeI+XjC5RwL7KptMFAXjC5RUL7Kpt+M:MljeI2l

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1971) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks