General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241027-2982favdnd

  • MD5

    a5dec9cd68c75301d742f7bf9789c4f8

  • SHA1

    24ee3d00677e483eae3654f0eab7a2a06e912288

  • SHA256

    32903da67efb928137a136a1c4ef8d546f4d74e3c03820b6989987c1846190e1

  • SHA512

    0d552f2f17ef3eb821b94288c9fd717568161003de257fd488b93a41c02257759480e52b93d5d19fee1311a87d6b6136233520c17351af772d5b2ccc6311f9b4

  • SSDEEP

    192:nXbslV5d8Mv+SUMyCP8okpm79NzTaBVpc8Mv+S2XbslV1yCP8okzvzTaBV2:nXbslV5d8Mv+SUMyCP8oom79Mc8Mv+SW

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      a5dec9cd68c75301d742f7bf9789c4f8

    • SHA1

      24ee3d00677e483eae3654f0eab7a2a06e912288

    • SHA256

      32903da67efb928137a136a1c4ef8d546f4d74e3c03820b6989987c1846190e1

    • SHA512

      0d552f2f17ef3eb821b94288c9fd717568161003de257fd488b93a41c02257759480e52b93d5d19fee1311a87d6b6136233520c17351af772d5b2ccc6311f9b4

    • SSDEEP

      192:nXbslV5d8Mv+SUMyCP8okpm79NzTaBVpc8Mv+S2XbslV1yCP8okzvzTaBV2:nXbslV5d8Mv+SUMyCP8oom79Mc8Mv+SW

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks