General
-
Target
bins.sh
-
Size
10KB
-
Sample
241026-kwky1szqgv
-
MD5
708108a8a35798abfe14e7944dcdfcb7
-
SHA1
649007a8839699d987da4693d77fb22f4ea01828
-
SHA256
cac89da922119800c87169c77330231cf10dea5a22207f3afebd2365ea27a415
-
SHA512
5b963842e83ab1d49769e3c22fe30b5b883407768e5ebd22032799eb55209c453b8e4d560263d73b7acced3a197d5152e636af7c61c5b62314dfd89b485a3ed3
-
SSDEEP
96:Jnu6x+2HRRnHsPP54/PW5hyVj9VWFF2cxPFlW5FMb5hyVj9VLMR4/PY9IJPFlW5M:xxWP54/PdWFEUA3/PvqsV
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240611-en
Malware Config
Targets
-
-
Target
bins.sh
-
Size
10KB
-
MD5
708108a8a35798abfe14e7944dcdfcb7
-
SHA1
649007a8839699d987da4693d77fb22f4ea01828
-
SHA256
cac89da922119800c87169c77330231cf10dea5a22207f3afebd2365ea27a415
-
SHA512
5b963842e83ab1d49769e3c22fe30b5b883407768e5ebd22032799eb55209c453b8e4d560263d73b7acced3a197d5152e636af7c61c5b62314dfd89b485a3ed3
-
SSDEEP
96:Jnu6x+2HRRnHsPP54/PW5hyVj9VWFF2cxPFlW5FMb5hyVj9VLMR4/PY9IJPFlW5M:xxWP54/PdWFEUA3/PvqsV
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Renames itself
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1