General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241027-g7rddswbjn

  • MD5

    9b934eb9471f7b80ea070ae4feb86150

  • SHA1

    9303ecd0d513c8024a554bf860d73fe5f98cce23

  • SHA256

    376053c6de63b75df1b5fda98e44fcf278b064c54f3fbb009df4e8c5d1fbc36e

  • SHA512

    e8b3fe4c18b161c588b07657e1609be4c3ad94a1fced10b0c828730ffb4079962bb6d7a1067c57666d9bcab83cbb6795e263783c41f9ab8aecca55f2f6ea4c83

  • SSDEEP

    96:YrHTrLtXVtIgNNNNNSVBxLQMs1VZ1Vx1VAVhVlV4/T8hZcL3LlLCakqz6LUY7tNN:k2y1pifn2FXeDiY1pifn23

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      9b934eb9471f7b80ea070ae4feb86150

    • SHA1

      9303ecd0d513c8024a554bf860d73fe5f98cce23

    • SHA256

      376053c6de63b75df1b5fda98e44fcf278b064c54f3fbb009df4e8c5d1fbc36e

    • SHA512

      e8b3fe4c18b161c588b07657e1609be4c3ad94a1fced10b0c828730ffb4079962bb6d7a1067c57666d9bcab83cbb6795e263783c41f9ab8aecca55f2f6ea4c83

    • SSDEEP

      96:YrHTrLtXVtIgNNNNNSVBxLQMs1VZ1Vx1VAVhVlV4/T8hZcL3LlLCakqz6LUY7tNN:k2y1pifn2FXeDiY1pifn23

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks