General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241028-c1vp1swjhr

  • MD5

    983c1aa3002db7f82617b43cd659c581

  • SHA1

    a4ed5b9527c45f8fd2926606512bf3fae46a8380

  • SHA256

    7ac05c613144c5e909cdf1cd4d39f6445cc999325f50bce1e855f19898bef53e

  • SHA512

    fcbd08abb414f0d1f3646716b05cbe474c72be6c996655a22929a8e1e301683dc6c77b909137408dd0daa0c9420bf9eb68102a16ec7cbbaab28f1bb9b349fbd5

  • SSDEEP

    192:0cW/YP+yrXApp3eK9Xk8RrXAppreK9Xk8oY:0cW/YmteK9Xk86eK9Xk89

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      983c1aa3002db7f82617b43cd659c581

    • SHA1

      a4ed5b9527c45f8fd2926606512bf3fae46a8380

    • SHA256

      7ac05c613144c5e909cdf1cd4d39f6445cc999325f50bce1e855f19898bef53e

    • SHA512

      fcbd08abb414f0d1f3646716b05cbe474c72be6c996655a22929a8e1e301683dc6c77b909137408dd0daa0c9420bf9eb68102a16ec7cbbaab28f1bb9b349fbd5

    • SSDEEP

      192:0cW/YP+yrXApp3eK9Xk8RrXAppreK9Xk8oY:0cW/YmteK9Xk86eK9Xk89

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks