General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241026-f5eq5szhme

  • MD5

    f9f550095fa6fd5b65dff2f730739d9a

  • SHA1

    2a650dc78b77f1ecfaa92bd806bcb60b46cc3481

  • SHA256

    5642da3d7b7313b4921cd1a2bfb888e9f77e935fd059cc595b03c98f023ff69e

  • SHA512

    6d5b7fcf4d66c38961ef98e65b00bcd9244b34ff60af0a55dd8c1e002be59037deeb78d7bb3e592e68e29ff1074889b644152746452d5e8719f550b05816ce9f

  • SSDEEP

    96:iERJJCd3Gikl7czaynKme+RVo9dm6wkB2GiklHTqzaynKmo+RVo9dmZVOB9DZjf:iER7Cd3Gikl7cuchGiklisF

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      f9f550095fa6fd5b65dff2f730739d9a

    • SHA1

      2a650dc78b77f1ecfaa92bd806bcb60b46cc3481

    • SHA256

      5642da3d7b7313b4921cd1a2bfb888e9f77e935fd059cc595b03c98f023ff69e

    • SHA512

      6d5b7fcf4d66c38961ef98e65b00bcd9244b34ff60af0a55dd8c1e002be59037deeb78d7bb3e592e68e29ff1074889b644152746452d5e8719f550b05816ce9f

    • SSDEEP

      96:iERJJCd3Gikl7czaynKme+RVo9dm6wkB2GiklHTqzaynKmo+RVo9dmZVOB9DZjf:iER7Cd3Gikl7cuchGiklisF

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks