General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241028-21nn5sxke1

  • MD5

    4515abd1275dc3eceeb736e5d2ef6c9e

  • SHA1

    b76d89be73dc7d541fbebe1c8093aab616ebde4b

  • SHA256

    d5b8e1d5158341d46f35d833ec845c221cb0be282babc36e2c7d41c2030ebd27

  • SHA512

    abb712cadfa5f000388b10dc965825967829aa3e988cd0b7ac0f40a6855810e2be7ed485691919c650b2f605d3ebd940c7d9c0e3eb84b8d05aac9c4b00396340

  • SSDEEP

    96:Y04QL7s7w7zow1F1VXL828m8q3LzsnUrXHLQ3p3B3x5RULJheU6yiTvNLJhWLG2n:7DKwlCjSLLzCqVLzD

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      4515abd1275dc3eceeb736e5d2ef6c9e

    • SHA1

      b76d89be73dc7d541fbebe1c8093aab616ebde4b

    • SHA256

      d5b8e1d5158341d46f35d833ec845c221cb0be282babc36e2c7d41c2030ebd27

    • SHA512

      abb712cadfa5f000388b10dc965825967829aa3e988cd0b7ac0f40a6855810e2be7ed485691919c650b2f605d3ebd940c7d9c0e3eb84b8d05aac9c4b00396340

    • SSDEEP

      96:Y04QL7s7w7zow1F1VXL828m8q3LzsnUrXHLQ3p3B3x5RULJheU6yiTvNLJhWLG2n:7DKwlCjSLLzCqVLzD

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks