General
-
Target
bins.sh
-
Size
10KB
-
Sample
241025-3wp7vatnfk
-
MD5
2ff5a9c12c5af9a9b943dc34a9808f0a
-
SHA1
561b5c7b3dab7237b77e0882f6e88ce55bca24b1
-
SHA256
b175fe485088251344294ac0e2361ed023c52d2095bd45b1de56bbc977422ec6
-
SHA512
4f08084fef5c71b0ccc6b5cdfe65e24c3f497220fb6015bc4b8fed6b18b267d07f2cb4afb30d42678e5aa4c1ecff2d3d4032990d47a53f35a6b797a5ebcbe8c0
-
SSDEEP
192:7AkUncQkCvCLCqCTCbCMjB03F9I1FD0ZJGRNnF9I1FDsZJGRNXCvCLCqCTCbCykX:7AkUncQyjB03F9I1x0ZJGRNnF9I1xsZL
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240611-en
Malware Config
Targets
-
-
Target
bins.sh
-
Size
10KB
-
MD5
2ff5a9c12c5af9a9b943dc34a9808f0a
-
SHA1
561b5c7b3dab7237b77e0882f6e88ce55bca24b1
-
SHA256
b175fe485088251344294ac0e2361ed023c52d2095bd45b1de56bbc977422ec6
-
SHA512
4f08084fef5c71b0ccc6b5cdfe65e24c3f497220fb6015bc4b8fed6b18b267d07f2cb4afb30d42678e5aa4c1ecff2d3d4032990d47a53f35a6b797a5ebcbe8c0
-
SSDEEP
192:7AkUncQkCvCLCqCTCbCMjB03F9I1FD0ZJGRNnF9I1FDsZJGRNXCvCLCqCTCbCykX:7AkUncQyjB03F9I1x0ZJGRNnF9I1xsZL
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Renames itself
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1