General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    250220-wxedeatnt2

  • MD5

    7eb2de1ea7019f91b62df1a6d27a2ed7

  • SHA1

    6483886dd87feaafa59fb05b3f68776770482456

  • SHA256

    a00ecd09ba374aa021e7ccc7b33173caa6e382fc3b93ba03326ebedece23c58a

  • SHA512

    14bdca8c1deebe4addffd12b4be8eaaaa13089b93591c2b4ef390c997c517b5bee340c8cdc2cab994c81f7a445d822fe3bafc785d4878d7da6c2744454ebb99b

  • SSDEEP

    192:vmZgdKQvHUdxvn/s5NzSnsvHUdx3n/s5NGA:vugdKASDA

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      7eb2de1ea7019f91b62df1a6d27a2ed7

    • SHA1

      6483886dd87feaafa59fb05b3f68776770482456

    • SHA256

      a00ecd09ba374aa021e7ccc7b33173caa6e382fc3b93ba03326ebedece23c58a

    • SHA512

      14bdca8c1deebe4addffd12b4be8eaaaa13089b93591c2b4ef390c997c517b5bee340c8cdc2cab994c81f7a445d822fe3bafc785d4878d7da6c2744454ebb99b

    • SSDEEP

      192:vmZgdKQvHUdxvn/s5NzSnsvHUdx3n/s5NGA:vugdKASDA

    • Detects Xorbot

    • Xorbot

      Xorbot is a linux botnet and trojan targeting IoT devices.

    • Xorbot family

    • Contacts a large (1700) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks