General
-
Target
bins.sh
-
Size
10KB
-
Sample
241023-w7rfqawfnk
-
MD5
28c4eef7e1bf06ceb5d700dae0b1904f
-
SHA1
8a4772667d8bbf3722d092d56e59e402d2e3e503
-
SHA256
5901e1172775bd06563708dbecf5570f6cfd6d5b6f4bb9502e7b74cd293965a3
-
SHA512
676f4792c15b78d5d2cab13afd6afca0936a62b130ef8c82785ff6d25875114a96a7316fee523c56633a748dc1e54b1425a99bd11427568faf75526d82fee445
-
SSDEEP
192:lSS5IXtliZl7j5NSFlXO5NSFlVhJtliZlR:lS8IE89w
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240418-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240729-en
Malware Config
Targets
-
-
Target
bins.sh
-
Size
10KB
-
MD5
28c4eef7e1bf06ceb5d700dae0b1904f
-
SHA1
8a4772667d8bbf3722d092d56e59e402d2e3e503
-
SHA256
5901e1172775bd06563708dbecf5570f6cfd6d5b6f4bb9502e7b74cd293965a3
-
SHA512
676f4792c15b78d5d2cab13afd6afca0936a62b130ef8c82785ff6d25875114a96a7316fee523c56633a748dc1e54b1425a99bd11427568faf75526d82fee445
-
SSDEEP
192:lSS5IXtliZl7j5NSFlXO5NSFlVhJtliZlR:lS8IE89w
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Renames itself
-
Unexpected DNS network traffic destination
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-