General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241026-w3qzdsvnal

  • MD5

    c3a67442db56ee6d5718cb9b8748a2a7

  • SHA1

    7439efa913e1f900f72ff80e1a271b84fe407877

  • SHA256

    19df6cfdcbf47f7d2db1e142b07bfd09db79bd1ade8c6f87ae300b7e07299813

  • SHA512

    ee896800093e9a5525f3110d7dbb4a475f534a1c1277c266f4f35ef58d6578e346eff768abda3f17514bbfd1ee925002de937c6bc213a20d18912936e415db73

  • SSDEEP

    192:0PXUAsXN4PcoJwIYVV7OyGe4qS5pcoJwIhyGe4qS9QPXUAsXq:0PXUDXN4PcoJwIYVV7OyGBqS5pcoJwIA

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      c3a67442db56ee6d5718cb9b8748a2a7

    • SHA1

      7439efa913e1f900f72ff80e1a271b84fe407877

    • SHA256

      19df6cfdcbf47f7d2db1e142b07bfd09db79bd1ade8c6f87ae300b7e07299813

    • SHA512

      ee896800093e9a5525f3110d7dbb4a475f534a1c1277c266f4f35ef58d6578e346eff768abda3f17514bbfd1ee925002de937c6bc213a20d18912936e415db73

    • SSDEEP

      192:0PXUAsXN4PcoJwIYVV7OyGe4qS5pcoJwIhyGe4qS9QPXUAsXq:0PXUDXN4PcoJwIYVV7OyGBqS5pcoJwIA

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks