General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241025-tkmg5ssfkr

  • MD5

    9cd5d51a5adb6a3ddb77c4a5462129f3

  • SHA1

    3b5f4d262c53489fa5cb53236828eb4601a173da

  • SHA256

    b94b7a30781ed3231615fd19c253df409acda3463bf142d2c2dccda50209e37b

  • SHA512

    ae605380c5b95bb048b7829a153d67012bf08b1e41d030e8c33bf9e538cc85535953ee102cdf7fddfe7c55618d2ad3ec14fa01760291c03f69895daea5f9a4e0

  • SSDEEP

    96:Vg3D6bLAJOLObOYOjO3Ot8dhmJpMAAU/rwg3DTrcfLwfJ+pAAU/rwgyW8dhmJp6k:Vu0iyxKet2O75N9iyxKeB

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      9cd5d51a5adb6a3ddb77c4a5462129f3

    • SHA1

      3b5f4d262c53489fa5cb53236828eb4601a173da

    • SHA256

      b94b7a30781ed3231615fd19c253df409acda3463bf142d2c2dccda50209e37b

    • SHA512

      ae605380c5b95bb048b7829a153d67012bf08b1e41d030e8c33bf9e538cc85535953ee102cdf7fddfe7c55618d2ad3ec14fa01760291c03f69895daea5f9a4e0

    • SSDEEP

      96:Vg3D6bLAJOLObOYOjO3Ot8dhmJpMAAU/rwg3DTrcfLwfJ+pAAU/rwgyW8dhmJp6k:Vu0iyxKet2O75N9iyxKeB

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks