General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241027-l571ksvjht

  • MD5

    38c016b5fafe4cb231ee103b3d469c38

  • SHA1

    11bf75788a74d2c7bf1a077fb4baedebb0fbf051

  • SHA256

    6f693f775447642c30c2026544c0b164b9b8a9142b2a9e8339452e36567cd244

  • SHA512

    bb6b857e72ce4063f5fb64cfe1b4950071040ba0b7ae6c3bbab6db49173f1bf43357fefdcd09c87d5c69920a5366e780036c41f4d1bf597042bb693386d5e86a

  • SSDEEP

    192:C2i/8cZEED6O20nMNso9OuNSWso9Ou32i/8cLEED6Ol:C2i/8cZEED6O20nMNso9OuNSWso9Ou3Z

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      38c016b5fafe4cb231ee103b3d469c38

    • SHA1

      11bf75788a74d2c7bf1a077fb4baedebb0fbf051

    • SHA256

      6f693f775447642c30c2026544c0b164b9b8a9142b2a9e8339452e36567cd244

    • SHA512

      bb6b857e72ce4063f5fb64cfe1b4950071040ba0b7ae6c3bbab6db49173f1bf43357fefdcd09c87d5c69920a5366e780036c41f4d1bf597042bb693386d5e86a

    • SSDEEP

      192:C2i/8cZEED6O20nMNso9OuNSWso9Ou32i/8cLEED6Ol:C2i/8cZEED6O20nMNso9OuNSWso9Ou3Z

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks