MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 8d5cb7d363c621bad5dcfcde02db240d99d9522f0ba118093ee3448777689036. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Xorbot


Vendor detections: 6


Intelligence 6 IOCs YARA File information Comments

SHA256 hash: 8d5cb7d363c621bad5dcfcde02db240d99d9522f0ba118093ee3448777689036
SHA3-384 hash: 45c16682580676f951efe3c2eb39bb9f2ebd53bf8e38af17bf24a3e8009d309ff0b490b0f78be289ac2fe7e96fab2e42
SHA1 hash: d0eda701e5d79788a769769d21daab3b1962d529
MD5 hash: 6836db81d5ebb1c5f837971dc4e1e331
humanhash: minnesota-tennessee-massachusetts-oregon
File name:bins.sh
Download: download sample
Signature Xorbot
File size:10'578 bytes
First seen:2025-01-04 11:31:34 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 192:UvHFQkDYEMNJUTBQ1NFq+G1NFq+MvHFQkkANJ1:ZEMNJUTBENJ1
TLSH T17522B0C622A17230E7C499947B51E995F082D4D0F4E32FC8C4D79AE52048FBAFC95F9A
Magika shell
Reporter abuse_ch
Tags:sh Xorbot
URLMalware sample (SHA256 hash)SignatureTags
http://66.63.187.225/bins/aPblkiAQY8snO3UVUUK3qbuGWHiWOuXKmAn/an/an/a
http://66.63.187.225/bins/OzpaTDvd8A1RfmrngpFnbiPM5r4fOMR0Fkn/an/an/a
http://66.63.187.225/bins/iZZfbhnBUxUZOyvEub48i5mGLg2FJiSklan/an/an/a
http://66.63.187.225/bins/DIEplegIVzC8dFkUaqsGE4xHlm8ORPYA3cn/an/an/a
http://66.63.187.225/bins/mLXQdX0IAXPrZZzryxc6U3paP2nITirYJun/an/an/a
http://66.63.187.225/bins/wecYm5y52JhCgk7RKTTPTJeum1sAgwDGoEn/an/an/a
http://66.63.187.225/bins/R3pv8blyD7EpHstXHBT6ZIpWnORzedA1VAn/an/an/a
http://66.63.187.225/bins/RZEAs2QL1FvkS2uCUDX6YGgGlALtouWspfn/an/an/a
http://66.63.187.225/bins/pC4RlKiweqTIrQSMSr1IihqG5OTiOE73Pcn/an/an/a
http://66.63.187.225/bins/qLUPvA8Am0JSJU9qL72ONTdNjkROX7O3A5n/an/an/a
http://66.63.187.225/bins/2a6tpt7IZT13H3ks7z4ma7SaVKzKIBwgLZn/an/an/a
http://66.63.187.225/bins/Dwhe7mJIeLjRvDUn2EmzzCBImt45sIv8nZn/an/an/a
http://66.63.187.225/bins/e2tmEOzQbPCKDV7BmHalK4yDkI3EDlZYM4n/an/an/a
http://66.63.187.225/bins/8AuORzQjsMJaZRz25M2z8sleayPfgT1zDFn/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
102
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
99.9%
Tags:
shellcode agent virus
Result
Verdict:
UNKNOWN
Threat name:
Win32.Trojan.Vigorf
Status:
Malicious
First seen:
2025-01-04 11:32:04 UTC
File Type:
Text (Shell)
AV detection:
11 of 23 (47.83%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xorbot antivm botnet defense_evasion discovery execution linux persistence privilege_escalatio trojan
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
Creates/modifies Cron job
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Contacts a large (2194) amount of remote hosts
Creates a large amount of network flows
Detects Xorbot
Xorbot
Xorbot family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Xorbot

sh 8d5cb7d363c621bad5dcfcde02db240d99d9522f0ba118093ee3448777689036

(this sample)

  
Delivery method
Distributed via web download

Comments