General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241023-yhh46ayfpr

  • MD5

    2a9479052ad7c218aab3bb7dbc2dd908

  • SHA1

    fad4dd9dd17077769576c543df7b0b6978669906

  • SHA256

    e379683464285fbd693b5e540a2e83aa2b2af4395fc95d2fe8febc3cec5c9188

  • SHA512

    f33381bf95a9a6ed9c59ae12a6b6b4364c7ceb7f5045d3127fa8ae4ecb72acb0d8de0a6837c4ee049bc0d23cc9e7b61323c106128409df305f47f7fdf46915e9

  • SSDEEP

    192:rS45gPlNiZlhXzXSFlP+zXSFldZrlNiZl9:rSigsKF0

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      2a9479052ad7c218aab3bb7dbc2dd908

    • SHA1

      fad4dd9dd17077769576c543df7b0b6978669906

    • SHA256

      e379683464285fbd693b5e540a2e83aa2b2af4395fc95d2fe8febc3cec5c9188

    • SHA512

      f33381bf95a9a6ed9c59ae12a6b6b4364c7ceb7f5045d3127fa8ae4ecb72acb0d8de0a6837c4ee049bc0d23cc9e7b61323c106128409df305f47f7fdf46915e9

    • SSDEEP

      192:rS45gPlNiZlhXzXSFlP+zXSFldZrlNiZl9:rSigsKF0

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks