General
-
Target
bins.sh
-
Size
10KB
-
Sample
241027-r5vm5sydkb
-
MD5
5ad9fce74e2c2c2bc17e1c3c7c1e9699
-
SHA1
f6a06bb0801544767f9542e687c8970f4da13169
-
SHA256
0f4b59b0aed7e7379e1c90146e79b7b79d7991c4bd9044a9b7da750a34bf2bda
-
SHA512
70e49474c5684e1b77cc2e47abe567e6d5e8b0f7edfca79a7feefe0ae389462b6747c2841c31acb7168e04c121a563d887515cbdb75530dca80da2ade3b95d16
-
SSDEEP
192:MAM8A8b2OyaeCz0sbcqmss0xFw/3xe3rhxFw/3Vfqmsl3rD3A8b2OneCz0sT:MA0aeCz0sbcqmss0xFw/3oxFw/31qmsJ
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240611-en
Malware Config
Targets
-
-
Target
bins.sh
-
Size
10KB
-
MD5
5ad9fce74e2c2c2bc17e1c3c7c1e9699
-
SHA1
f6a06bb0801544767f9542e687c8970f4da13169
-
SHA256
0f4b59b0aed7e7379e1c90146e79b7b79d7991c4bd9044a9b7da750a34bf2bda
-
SHA512
70e49474c5684e1b77cc2e47abe567e6d5e8b0f7edfca79a7feefe0ae389462b6747c2841c31acb7168e04c121a563d887515cbdb75530dca80da2ade3b95d16
-
SSDEEP
192:MAM8A8b2OyaeCz0sbcqmss0xFw/3xe3rhxFw/3Vfqmsl3rD3A8b2OneCz0sT:MA0aeCz0sbcqmss0xFw/3oxFw/31qmsJ
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Renames itself
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1