MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 928773027d3ebcca9126428406204bb47948765cf1f4778cf68bb851e0162f17. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Xorbot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 928773027d3ebcca9126428406204bb47948765cf1f4778cf68bb851e0162f17
SHA3-384 hash: 92fc182a7833877dc7278ae150f7e324c74f3f480787f8b85a9de7123a087424cb74fbd6340c31885ff5ad8197fe1e85
SHA1 hash: 857b799e781fb2544f2fcfb751413708ea28784e
MD5 hash: 5fdadb6b325ad87328f6d9f16f6d7b65
humanhash: fruit-oscar-uncle-harry
File name:bins.sh
Download: download sample
Signature Xorbot
File size:10'578 bytes
First seen:2025-01-04 10:31:35 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 192:SZxFQkhYmovDURTmPnFq+qPnFq+KZxFQkGEvD1:BmovDURTmvD1
TLSH T15D22CDC911E163B06FCC9D2C7B62BD29A0C044D0ACC11E65C6F95DAABC4CF987865F8B
Magika shell
Reporter abuse_ch
Tags:sh Xorbot
URLMalware sample (SHA256 hash)SignatureTags
http://146.19.162.73/bins/aPblkiAQY8snO3UVUUK3qbuGWHiWOuXKmAn/an/an/a
http://146.19.162.73/bins/OzpaTDvd8A1RfmrngpFnbiPM5r4fOMR0Fkn/an/an/a
http://146.19.162.73/bins/iZZfbhnBUxUZOyvEub48i5mGLg2FJiSklan/an/an/a
http://146.19.162.73/bins/DIEplegIVzC8dFkUaqsGE4xHlm8ORPYA3cn/an/an/a
http://146.19.162.73/bins/mLXQdX0IAXPrZZzryxc6U3paP2nITirYJun/an/an/a
http://146.19.162.73/bins/wecYm5y52JhCgk7RKTTPTJeum1sAgwDGoEn/an/an/a
http://146.19.162.73/bins/R3pv8blyD7EpHstXHBT6ZIpWnORzedA1VAn/an/an/a
http://146.19.162.73/bins/RZEAs2QL1FvkS2uCUDX6YGgGlALtouWspfn/an/an/a
http://146.19.162.73/bins/pC4RlKiweqTIrQSMSr1IihqG5OTiOE73Pcn/an/an/a
http://146.19.162.73/bins/qLUPvA8Am0JSJU9qL72ONTdNjkROX7O3A5n/an/an/a
http://146.19.162.73/bins/2a6tpt7IZT13H3ks7z4ma7SaVKzKIBwgLZn/an/an/a
http://146.19.162.73/bins/Dwhe7mJIeLjRvDUn2EmzzCBImt45sIv8nZn/an/an/a
http://146.19.162.73/bins/e2tmEOzQbPCKDV7BmHalK4yDkI3EDlZYM4n/an/an/a
http://146.19.162.73/bins/8AuORzQjsMJaZRz25M2z8sleayPfgT1zDFn/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
107
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Score:
94.9%
Tags:
shellcode mirai agent hype
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug busybox evasive lolbin remote
Result
Verdict:
UNKNOWN
Threat name:
Script.Trojan.Multiverze
Status:
Malicious
First seen:
2025-01-04 10:32:04 UTC
File Type:
Text (Shell)
AV detection:
11 of 23 (47.83%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xorbot antivm botnet defense_evasion discovery execution linux persistence privilege_escalatio trojan
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
Creates/modifies Cron job
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Contacts a large (2228) amount of remote hosts
Creates a large amount of network flows
Detects Xorbot
Xorbot
Xorbot family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Xorbot

sh 928773027d3ebcca9126428406204bb47948765cf1f4778cf68bb851e0162f17

(this sample)

  
Delivery method
Distributed via web download

Comments