MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 7b91847f2f91979b157d2d9a1c86a1af72f870474ff5e06955441dc3e831d8ff. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Xorbot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 7b91847f2f91979b157d2d9a1c86a1af72f870474ff5e06955441dc3e831d8ff
SHA3-384 hash: 971e8771a9faf7021081b76e5416fc2017154f109f2c1fd9d7c6a108f0dffd7512cf84ed718a9debefde9b7e5bdf4bcc
SHA1 hash: 290de347fd1c82a321665fe064a309b572388ea4
MD5 hash: 6e6997bf49581bf245df9342aecf0877
humanhash: oklahoma-football-missouri-delaware
File name:bins.sh
Download: download sample
Signature Xorbot
File size:10'578 bytes
First seen:2025-01-04 12:31:38 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 192:NPzbDjWKCG3lLb3Dnm+bd8rgHEzbDjWKz3Dnm+xO:N7CG3lLv6rgH8Q
TLSH T1C722F1C913D283B599ED8E2929B7FDA4518059C6EDC41E57DAE82CA6FDCCF843138E04
Magika shell
Reporter abuse_ch
Tags:sh Xorbot
URLMalware sample (SHA256 hash)SignatureTags
http://146.19.162.73/bins/crBQJRi7Sr8LjsqBMamJOi4yRgoz2NaaJWn/an/an/a
http://146.19.162.73/bins/oNQq0FuMrbDoaq0bKoh20VUNtpYG9qGzKqn/an/an/a
http://146.19.162.73/bins/nbLGIJqSz2jiCpg58QXlv276j8t521Qkbwn/an/an/a
http://146.19.162.73/bins/NwgZjiddelby3FzsCZ1mLRZx6SMLzL8VZmn/an/an/a
http://146.19.162.73/bins/cC2GQDEG43eSnGF7850InqXO7G7etnVSgXn/an/an/a
http://146.19.162.73/bins/N31JgRGvSe8Pm2dzryxxZA0FBsRPqRiDcZn/an/an/a
http://146.19.162.73/bins/N6HvBFk484vgJrudawOM4ucFM9drDDuxbhn/an/an/a
http://146.19.162.73/bins/K0s22ahTDPhXCp6GMr4hDDUmzvU0DYbAcMn/an/an/a
http://146.19.162.73/bins/tIgfGoHqb8bpgx3ayz1BM7ZY4XDwKSDefvn/an/an/a
http://146.19.162.73/bins/xpiMhz4G59GdJkdU2EZscOOlhJRDZVpolQn/an/an/a
http://146.19.162.73/bins/Iq5BNwWZM3jWRjA92Xdub38TuK9Jz8HX8yn/an/an/a
http://146.19.162.73/bins/0NITpwdl9EdhCDBoxt1VicWeYysF0PIqmvn/an/an/a
http://146.19.162.73/bins/GUKwAd1E6AfxFRJ37kYWGxRyTlHiCSWPPSn/an/an/a
http://146.19.162.73/bins/8xTIabJbpCdTA0zJpTJ26bb7MoeBqOWbcTn/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
96
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug busybox evasive lolbin remote
Result
Verdict:
UNKNOWN
Threat name:
Win32.Trojan.Mirai
Status:
Malicious
First seen:
2025-01-04 12:32:04 UTC
File Type:
Text (Shell)
AV detection:
14 of 38 (36.84%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xorbot antivm botnet defense_evasion discovery execution linux persistence privilege_escalatio trojan
Behaviour
Reads runtime system information
Writes file to tmp directory
Checks CPU configuration
Creates/modifies Cron job
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Contacts a large (2179) amount of remote hosts
Creates a large amount of network flows
Detects Xorbot
Xorbot
Xorbot family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Xorbot

sh 7b91847f2f91979b157d2d9a1c86a1af72f870474ff5e06955441dc3e831d8ff

(this sample)

  
Delivery method
Distributed via web download

Comments