General
-
Target
yak.sh
-
Size
1KB
-
Sample
241019-nsv7cstgrf
-
MD5
d38e8407bbc72cbd2057efdd3d8b7a05
-
SHA1
89e1ebb28cea58b8f9eb728383f8cb565d58518e
-
SHA256
ea83411bd7b6e5a7364f7b8b9018f0f17f7084aeb58a47736dd80c99cfeac7f1
-
SHA512
c0a0450a308555a0c3ff52d7d8fc0ce8ff55b9bca8b700cdf87b222b2bfe2ea112de21aa59a8535020b7d4636f64334606494da99e007caecb09ff3ae69589c9
Static task
static1
Behavioral task
behavioral1
Sample
yak.sh
Resource
ubuntu1804-amd64-20240729-en
Behavioral task
behavioral2
Sample
yak.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
yak.sh
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral4
Sample
yak.sh
Resource
debian9-mipsel-20240226-en
Malware Config
Targets
-
-
Target
yak.sh
-
Size
1KB
-
MD5
d38e8407bbc72cbd2057efdd3d8b7a05
-
SHA1
89e1ebb28cea58b8f9eb728383f8cb565d58518e
-
SHA256
ea83411bd7b6e5a7364f7b8b9018f0f17f7084aeb58a47736dd80c99cfeac7f1
-
SHA512
c0a0450a308555a0c3ff52d7d8fc0ce8ff55b9bca8b700cdf87b222b2bfe2ea112de21aa59a8535020b7d4636f64334606494da99e007caecb09ff3ae69589c9
Score7/10-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Enumerates running processes
Discovers information about currently running processes on the system
-