Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. Xbash

Xbash

Xbash is a malware family that has targeted Linux and Microsoft Windows servers. The malware has been tied to the Iron Group, a threat actor group known for previous ransomware attacks.Xbash was developed in Python and then converted into a self-contained Linux ELF executable by using PyInstaller.[1]

ID: S0341
Type: MALWARE
Platforms: Windows, Linux
Version: 1.2
Created: 30 January 2019
Last Modified: 25 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1071.001Application Layer Protocol:Web Protocols

Xbash uses HTTP for C2 communications.[1]

EnterpriseT1547.001Boot or Logon Autostart Execution:Registry Run Keys / Startup Folder

Xbash can create a Startup item for persistence if it determines it is on a Windows system.[1]

EnterpriseT1110.001Brute Force:Password Guessing

Xbash can obtain a list of weak passwords from the C2 server to use for brute forcing as well as attempt to brute force services with open ports.[1][2]

EnterpriseT1059.001Command and Scripting Interpreter:PowerShell

Xbash can use scripts to invoke PowerShell to download a malicious PE executable or PE DLL for execution.[1]

.005Command and Scripting Interpreter:Visual Basic

Xbash can execute malicious VBScript payloads on the victim’s machine.[1]

.007Command and Scripting Interpreter:JavaScript

Xbash can execute malicious JavaScript payloads on the victim’s machine.[1]

EnterpriseT1485Data Destruction

Xbash has destroyed Linux-based databases as part of its ransomware capabilities.[1]

EnterpriseT1486Data Encrypted for Impact

Xbash has maliciously encrypted victim's database systems and demanded a cryptocurrency ransom be paid.[1]

EnterpriseT1203Exploitation for Client Execution

Xbash can attempt to exploit known vulnerabilities in Hadoop, Redis, or ActiveMQ when it finds those services running in order to conduct further execution.[1][2]

EnterpriseT1105Ingress Tool Transfer

Xbash can download additional malicious files from its C2 server.[1]

EnterpriseT1046Network Service Discovery

Xbash can perform port scanning of TCP and UDP ports.[1]

EnterpriseT1053.003Scheduled Task/Job:Cron

Xbash can create a cronjob for persistence if it determines it is on a Linux system.[1]

EnterpriseT1218.005System Binary Proxy Execution:Mshta

Xbash can use mshta for executing scripts.[1]

.010System Binary Proxy Execution:Regsvr32

Xbash can use regsvr32 for executing scripts.[1]

EnterpriseT1016System Network Configuration Discovery

Xbash can collect IP addresses and local intranet information from a victim’s machine.[1]

EnterpriseT1102.001Web Service:Dead Drop Resolver

Xbash can obtain a webpage hosted on Pastebin to update its C2 domain list.[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp