General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241028-d62k7axldt

  • MD5

    05676d582a06a0b7302060800ad72ef0

  • SHA1

    c8fe43d797cdc8390adbf73e026c2cc0c5d81757

  • SHA256

    90cc63944058f1b1b2f5b40dc1288529dbff2e75e76381b2a35de21c4fabc5c3

  • SHA512

    3101d43946e54581dc59839ccf2376ef12db901a62a51c48eb2aa6d957661cd13b39a1067645b9cf5f5fded5df5b641f80b3d58370ca805ad4c04123de0419b7

  • SSDEEP

    192:4yEZu5+szPApp5UQ9Xk8lzPApp5UQ9Xk8Mg:4yEZucBUQ9Xk8UUQ9Xk8L

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      05676d582a06a0b7302060800ad72ef0

    • SHA1

      c8fe43d797cdc8390adbf73e026c2cc0c5d81757

    • SHA256

      90cc63944058f1b1b2f5b40dc1288529dbff2e75e76381b2a35de21c4fabc5c3

    • SHA512

      3101d43946e54581dc59839ccf2376ef12db901a62a51c48eb2aa6d957661cd13b39a1067645b9cf5f5fded5df5b641f80b3d58370ca805ad4c04123de0419b7

    • SSDEEP

      192:4yEZu5+szPApp5UQ9Xk8lzPApp5UQ9Xk8Mg:4yEZucBUQ9Xk8UUQ9Xk8L

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks