MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 eece9cdbc73eb1580c67ece7a9ef15da0bb6d087746ea7d602b6fa928f5dedd5. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Xorbot


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: eece9cdbc73eb1580c67ece7a9ef15da0bb6d087746ea7d602b6fa928f5dedd5
SHA3-384 hash: 8d18b0e1cd79ae7569f85ec5f6a67719a71279de58a0dbc964f1f01f17266bb849cff97476550189d11a49c3b4a36b0c
SHA1 hash: 97db7e55d8e39803fa9534204594a595529eca73
MD5 hash: 25a7814863dd354a01cfd6baf43b95ff
humanhash: lemon-utah-maine-early
File name:bins.sh
Download: download sample
Signature Xorbot
File size:10'578 bytes
First seen:2025-01-04 13:21:45 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 192:/919DjWKEU3nHNB1nm+bNmvWh619DjWKrB1nm+1a:/ZEU3nHZkvWh6M
TLSH T10E2242CB33D19335D1D18A952AB2D1C4E102E9C6F9C72FCED8CBAEE46584F967858E10
Magika shell
Reporter abuse_ch
Tags:sh Xorbot
URLMalware sample (SHA256 hash)SignatureTags
http://66.63.187.225/bins/crBQJRi7Sr8LjsqBMamJOi4yRgoz2NaaJWn/an/an/a
http://66.63.187.225/bins/oNQq0FuMrbDoaq0bKoh20VUNtpYG9qGzKqn/an/an/a
http://66.63.187.225/bins/nbLGIJqSz2jiCpg58QXlv276j8t521Qkbwn/an/an/a
http://66.63.187.225/bins/NwgZjiddelby3FzsCZ1mLRZx6SMLzL8VZmn/an/an/a
http://66.63.187.225/bins/cC2GQDEG43eSnGF7850InqXO7G7etnVSgXn/an/an/a
http://66.63.187.225/bins/N31JgRGvSe8Pm2dzryxxZA0FBsRPqRiDcZn/an/an/a
http://66.63.187.225/bins/N6HvBFk484vgJrudawOM4ucFM9drDDuxbhn/an/an/a
http://66.63.187.225/bins/K0s22ahTDPhXCp6GMr4hDDUmzvU0DYbAcMn/an/an/a
http://66.63.187.225/bins/tIgfGoHqb8bpgx3ayz1BM7ZY4XDwKSDefvn/an/an/a
http://66.63.187.225/bins/xpiMhz4G59GdJkdU2EZscOOlhJRDZVpolQn/an/an/a
http://66.63.187.225/bins/Iq5BNwWZM3jWRjA92Xdub38TuK9Jz8HX8yn/an/an/a
http://66.63.187.225/bins/0NITpwdl9EdhCDBoxt1VicWeYysF0PIqmvn/an/an/a
http://66.63.187.225/bins/GUKwAd1E6AfxFRJ37kYWGxRyTlHiCSWPPSn/an/an/a
http://66.63.187.225/bins/8xTIabJbpCdTA0zJpTJ26bb7MoeBqOWbcTn/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
93
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
anti-debug busybox evasive lolbin remote
Result
Verdict:
UNKNOWN
Threat name:
Win32.Trojan.Mirai
Status:
Malicious
First seen:
2025-01-04 13:22:11 UTC
File Type:
Text (Shell)
AV detection:
14 of 38 (36.84%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xorbot antivm botnet defense_evasion discovery execution linux persistence privilege_escalatio trojan
Behaviour
Reads runtime system information
Writes file to tmp directory
Checks CPU configuration
Creates/modifies Cron job
Enumerates running processes
File and Directory Permissions Modification
Executes dropped EXE
Renames itself
Contacts a large (2111) amount of remote hosts
Creates a large amount of network flows
Detects Xorbot
Xorbot
Xorbot family
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Xorbot

sh eece9cdbc73eb1580c67ece7a9ef15da0bb6d087746ea7d602b6fa928f5dedd5

(this sample)

  
Delivery method
Distributed via web download

Comments