General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241026-z1573sxld1

  • MD5

    22f4216f3ccd3bd3da6abc07872ed694

  • SHA1

    a8a8f0e68a4e021880b294c0ea1a5b5d771b2cfa

  • SHA256

    33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4

  • SHA512

    5d2853a61c5cd7ab892aa41605cc6b8826c8c2ed15992aa7ba4dabefc73abc788984183ff8c5290401418b5567559486f6dd87e620a151cffa95ea7ffb31d3c3

  • SSDEEP

    192:0D8ANuGrOy9GmNLkmCFO3HeVlhz3HeVlh0f8ANuGVOy9GmV:C8ANuGrOy9GmNLkmCFF8ANuGVOy9GmV

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      22f4216f3ccd3bd3da6abc07872ed694

    • SHA1

      a8a8f0e68a4e021880b294c0ea1a5b5d771b2cfa

    • SHA256

      33e01480c1e0a659e4845f594c863cc3994815eceacd26b71e4473884ea94ba4

    • SHA512

      5d2853a61c5cd7ab892aa41605cc6b8826c8c2ed15992aa7ba4dabefc73abc788984183ff8c5290401418b5567559486f6dd87e620a151cffa95ea7ffb31d3c3

    • SSDEEP

      192:0D8ANuGrOy9GmNLkmCFO3HeVlhz3HeVlh0f8ANuGVOy9GmV:C8ANuGrOy9GmNLkmCFF8ANuGVOy9GmV

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks