MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 d1908c0ac5475604d120936edf3f2b1f6e6b97cde0ce926f55b511e8b10e6d0a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Xorbot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: d1908c0ac5475604d120936edf3f2b1f6e6b97cde0ce926f55b511e8b10e6d0a
SHA3-384 hash: 80c2986512ff7c7af9a3bf3061dc134368184dba126bf63cae92a3b269dbd65e639485584f099df9e4a11afc32bd3be8
SHA1 hash: 9d0cb9f848c6b652e798b82d3691b451ceadf9d6
MD5 hash: 7d528e5f7a321e92d3c30794a3530b62
humanhash: blossom-table-mirror-september
File name:bins.sh
Download: download sample
Signature Xorbot
File size:10'830 bytes
First seen:2025-01-04 10:31:36 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 192:DuGFQkCYBoA0UWMHYQFq+MYQFq+buGFQkfoA01:NBoA0UWMBA01
TLSH T10622DFC4216922312DF4DE1A7A592CE464487C80ACC95E5848D566EC844EFFF78D2FFE
Magika shell
Reporter abuse_ch
Tags:sh Xorbot
URLMalware sample (SHA256 hash)SignatureTags
http://conn.masjesu.zip/bins/aPblkiAQY8snO3UVUUK3qbuGWHiWOuXKmAn/an/an/a
http://conn.masjesu.zip/bins/OzpaTDvd8A1RfmrngpFnbiPM5r4fOMR0Fkn/an/an/a
http://conn.masjesu.zip/bins/iZZfbhnBUxUZOyvEub48i5mGLg2FJiSklan/an/an/a
http://conn.masjesu.zip/bins/DIEplegIVzC8dFkUaqsGE4xHlm8ORPYA3cn/an/an/a
http://conn.masjesu.zip/bins/mLXQdX0IAXPrZZzryxc6U3paP2nITirYJun/an/an/a
http://conn.masjesu.zip/bins/wecYm5y52JhCgk7RKTTPTJeum1sAgwDGoEn/an/an/a
http://conn.masjesu.zip/bins/R3pv8blyD7EpHstXHBT6ZIpWnORzedA1VAn/an/an/a
http://conn.masjesu.zip/bins/RZEAs2QL1FvkS2uCUDX6YGgGlALtouWspfn/an/an/a
http://conn.masjesu.zip/bins/pC4RlKiweqTIrQSMSr1IihqG5OTiOE73Pcn/an/an/a
http://conn.masjesu.zip/bins/qLUPvA8Am0JSJU9qL72ONTdNjkROX7O3A5n/an/an/a
http://conn.masjesu.zip/bins/2a6tpt7IZT13H3ks7z4ma7SaVKzKIBwgLZn/an/an/a
http://conn.masjesu.zip/bins/Dwhe7mJIeLjRvDUn2EmzzCBImt45sIv8nZn/an/an/a
http://conn.masjesu.zip/bins/e2tmEOzQbPCKDV7BmHalK4yDkI3EDlZYM4n/an/an/a
http://conn.masjesu.zip/bins/8AuORzQjsMJaZRz25M2z8sleayPfgT1zDFn/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
107
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug busybox evasive lolbin remote
Result
Verdict:
UNKNOWN
Threat name:
Win32.Trojan.Mirai
Status:
Malicious
First seen:
2025-01-04 10:32:05 UTC
File Type:
Text (Shell)
AV detection:
17 of 38 (44.74%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xorbot antivm botnet defense_evasion discovery execution linux persistence privilege_escalatio trojan
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
Creates a large amount of network flows
Creates/modifies Cron job
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Contacts a large (1789) amount of remote hosts
Detects Xorbot
Xorbot
Xorbot family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Xorbot

sh d1908c0ac5475604d120936edf3f2b1f6e6b97cde0ce926f55b511e8b10e6d0a

(this sample)

  
Delivery method
Distributed via web download

Comments