General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241022-3ljx3szdra

  • MD5

    8f3990b3360c72f0f7ac964a9d8a6e25

  • SHA1

    d8e3248deb998421866193f89bc50039a307780e

  • SHA256

    46510b63c8a83503ae6ca32257d2960244feff790c7d22e9060b534af57be6e4

  • SHA512

    bf643037de5c6fa926ea23d0b83471e432164904fc84e69be27e14c71f97dff5afe3ba143ba7676b5fb3532b9734b6cd71dbae247b3b2610610b3b26a056eb41

  • SSDEEP

    192:sfTg1NBk5BZsnqkBR2rHXkBR2rHdfTg1NMXEb:Z+BKnqkBR2rHXkBR2rHtW

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      8f3990b3360c72f0f7ac964a9d8a6e25

    • SHA1

      d8e3248deb998421866193f89bc50039a307780e

    • SHA256

      46510b63c8a83503ae6ca32257d2960244feff790c7d22e9060b534af57be6e4

    • SHA512

      bf643037de5c6fa926ea23d0b83471e432164904fc84e69be27e14c71f97dff5afe3ba143ba7676b5fb3532b9734b6cd71dbae247b3b2610610b3b26a056eb41

    • SSDEEP

      192:sfTg1NBk5BZsnqkBR2rHXkBR2rHdfTg1NMXEb:Z+BKnqkBR2rHXkBR2rHtW

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks