General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241027-r5vm5sydkb

  • MD5

    5ad9fce74e2c2c2bc17e1c3c7c1e9699

  • SHA1

    f6a06bb0801544767f9542e687c8970f4da13169

  • SHA256

    0f4b59b0aed7e7379e1c90146e79b7b79d7991c4bd9044a9b7da750a34bf2bda

  • SHA512

    70e49474c5684e1b77cc2e47abe567e6d5e8b0f7edfca79a7feefe0ae389462b6747c2841c31acb7168e04c121a563d887515cbdb75530dca80da2ade3b95d16

  • SSDEEP

    192:MAM8A8b2OyaeCz0sbcqmss0xFw/3xe3rhxFw/3Vfqmsl3rD3A8b2OneCz0sT:MA0aeCz0sbcqmss0xFw/3oxFw/31qmsJ

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      5ad9fce74e2c2c2bc17e1c3c7c1e9699

    • SHA1

      f6a06bb0801544767f9542e687c8970f4da13169

    • SHA256

      0f4b59b0aed7e7379e1c90146e79b7b79d7991c4bd9044a9b7da750a34bf2bda

    • SHA512

      70e49474c5684e1b77cc2e47abe567e6d5e8b0f7edfca79a7feefe0ae389462b6747c2841c31acb7168e04c121a563d887515cbdb75530dca80da2ade3b95d16

    • SSDEEP

      192:MAM8A8b2OyaeCz0sbcqmss0xFw/3xe3rhxFw/3Vfqmsl3rD3A8b2OneCz0sT:MA0aeCz0sbcqmss0xFw/3oxFw/31qmsJ

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks