General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241023-t4ss9szfkg

  • MD5

    28e68f4a8e17f58eb03239953a34f7e6

  • SHA1

    ab686c91da287340dad814683646a6b42978b168

  • SHA256

    ed5983e9e277434326f38c82c7ff7225bb0b45e772d34f74927ccf230df5061f

  • SHA512

    ad6c64228000359844d7cbf7134a85387cef19f1f8d10ee5fb2c649958583cabe83458cc1a0785876804db6f37239ce2a7548eca8ad5c6aca61903a7de19b09f

  • SSDEEP

    192:W0H2erUorJWr9dhjRxANRbqck7YcxQE/gYXYMpAAd5MUbYsyck7YcvQE/gYRYMp9:W0H2erUorEr9dkQYMpAAd5MUbYsMYMp9

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      28e68f4a8e17f58eb03239953a34f7e6

    • SHA1

      ab686c91da287340dad814683646a6b42978b168

    • SHA256

      ed5983e9e277434326f38c82c7ff7225bb0b45e772d34f74927ccf230df5061f

    • SHA512

      ad6c64228000359844d7cbf7134a85387cef19f1f8d10ee5fb2c649958583cabe83458cc1a0785876804db6f37239ce2a7548eca8ad5c6aca61903a7de19b09f

    • SSDEEP

      192:W0H2erUorJWr9dhjRxANRbqck7YcxQE/gYXYMpAAd5MUbYsyck7YcvQE/gYRYMp9:W0H2erUorEr9dkQYMpAAd5MUbYsMYMp9

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks