MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 fa3f51a99517fa040c8067d9b5d52743a772ddd6ac0f8ae2101fac9fa419b1ee. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Xorbot


Vendor detections: 6


Intelligence 6 IOCs YARA 2 File information Comments

SHA256 hash: fa3f51a99517fa040c8067d9b5d52743a772ddd6ac0f8ae2101fac9fa419b1ee
SHA3-384 hash: 5e1c6bfad264e194bc7144be2bd5a78602a60129cd413f8fb37bca9919794018476beb62dc01091c3d70ab0eef0d5acd
SHA1 hash: edac461dda6f5e615dbb273ea546b434014629b6
MD5 hash: 205ca653ac48288dd16d37dc7220095d
humanhash: failed-early-beryllium-thirteen
File name:bins.sh
Download: download sample
Signature Xorbot
File size:10'830 bytes
First seen:2025-01-01 10:25:38 UTC
Last seen:Never
File type: sh
MIME type:text/x-shellscript
ssdeep 192:gIU2KmG/+4UVxGDj/zy22iNJqbzFxSpdPJIU2KmGIVxGDjvu22gNJqbzdIpdU:gIU2KmG/+4UVxGDj/zy2MxSpdPJIU2Ko
TLSH T16F22E1C9124428236CF29F2B397A46F429692C905DC85E6E88C82CDCD41FEEF35D5DB9
Magika shell
Reporter abuse_ch
Tags:sh Xorbot
URLMalware sample (SHA256 hash)SignatureTags
http://conn.masjesu.zip/bins/Nuy2RpbbJTL407q3hHcK77WA9DY9YqWwAVn/an/an/a
http://conn.masjesu.zip/bins/Q7K4ESNxTCFrtdAcaaNQTNO4NAqSytln8Xn/an/an/a
http://conn.masjesu.zip/bins/EKf9h1eFD6AYue8Za7BX18e1BtOa5gbYaHn/an/an/a
http://conn.masjesu.zip/bins/guN9uaSvvocNhWOaXoZbA2QnhUa8GysCVLn/an/an/a
http://conn.masjesu.zip/bins/2HHoUihvOaeWAWgRUWVfW90Ds2JCM0EdRNn/an/an/a
http://conn.masjesu.zip/bins/gn9dppRuMPU0kXQRX3MNTqhJelCYvlpPjYn/an/an/a
http://conn.masjesu.zip/bins/j0UC6ooV3JF6EL0Ih3A4ZikzCJSfvBXdP5n/an/an/a
http://conn.masjesu.zip/bins/qadMJpw0ZLF23KzqDpa504vMSfRztJHTrJn/an/an/a
http://conn.masjesu.zip/bins/smPHVMAMKqfr9buwaSmMWQ3BpdMcn2tuy7n/an/an/a
http://conn.masjesu.zip/bins/FWooLrK3wvW5B9mp7YpEAq2jr1aYivOSbTn/an/an/a
http://conn.masjesu.zip/bins/RiW1bk5XZ0rOyp5mNC3BRiCe7ZMef83kQ1n/an/an/a
http://conn.masjesu.zip/bins/F0xO7mD5GLyAEbrEHNucSd9RI0qdLcvla9n/an/an/a
http://conn.masjesu.zip/bins/7OOYDG4eDPELGTHYQSBuwKEFSWhBkOl09cn/an/an/a
http://conn.masjesu.zip/bins/BqDnox7E8Oozu4Ha54TSHe9KRa5oJae7rIn/an/an/a

Intelligence


File Origin
# of uploads :
1
# of downloads :
98
Origin country :
DE DE
Vendor Threat Intelligence
Verdict:
Malicious
Threat level:
  10/10
Confidence:
100%
Tags:
busybox evasive
Result
Verdict:
UNKNOWN
Threat name:
Win32.Trojan.Mirai
Status:
Malicious
First seen:
2025-01-01 10:26:05 UTC
File Type:
Text (Shell)
AV detection:
17 of 38 (44.74%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:xorbot antivm botnet defense_evasion discovery linux trojan
Behaviour
Reads runtime system information
System Network Configuration Discovery
Writes file to tmp directory
Checks CPU configuration
File and Directory Permissions Modification
Executes dropped EXE
Detects Xorbot
Xorbot
Xorbot family
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:golang_david_CSC846
Author:David
Description:CSC-846 Golang
Rule name:Linux_Shellscript_Downloader
Author:albertzsigovits
Description:Generic Approach to Shellscript downloaders

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Xorbot

sh fa3f51a99517fa040c8067d9b5d52743a772ddd6ac0f8ae2101fac9fa419b1ee

(this sample)

  
Delivery method
Distributed via web download

Comments