General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241023-fx413avapn

  • MD5

    dee52481d66a96706dfff98a1449ac4b

  • SHA1

    6d3411ca5a408ce08ab71cb7dbf10701489af88d

  • SHA256

    fd603d13c31830805a880fbbd914e548d0e437aa3b805512c97b97d89cb310d3

  • SHA512

    1ebffeb079e49e4a2640cc01dc9e2c70dc856c86a4a9a5662fa3fc7f17b5b9ef639813a41b0250dc1057172fe8939bf23f6f1f124a8b288ba4de9a0d53d6db04

  • SSDEEP

    192:uNbNbN2NHNTJtRtIFtVxegIht58GO8tHN1QBFLNbNbN2NHNTJ7RtIFtjxegIhtRr:uNbNbN2NHNTJtRtIFtOp8GO8t2NbNbNM

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      dee52481d66a96706dfff98a1449ac4b

    • SHA1

      6d3411ca5a408ce08ab71cb7dbf10701489af88d

    • SHA256

      fd603d13c31830805a880fbbd914e548d0e437aa3b805512c97b97d89cb310d3

    • SHA512

      1ebffeb079e49e4a2640cc01dc9e2c70dc856c86a4a9a5662fa3fc7f17b5b9ef639813a41b0250dc1057172fe8939bf23f6f1f124a8b288ba4de9a0d53d6db04

    • SSDEEP

      192:uNbNbN2NHNTJtRtIFtVxegIht58GO8tHN1QBFLNbNbN2NHNTJ7RtIFtjxegIhtRr:uNbNbN2NHNTJtRtIFtOp8GO8t2NbNbNM

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks