General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241028-d62k7azcjg

  • MD5

    91f4641ec25ce0e627692a356d6aaf46

  • SHA1

    23e85f9ca34cbaf825449f7c01b0926537262769

  • SHA256

    cb3071169b57757ec0a6ae35a560e6b60e0573706fd30facf0855aafff92b6f7

  • SHA512

    8e6b7d73d971c0cb6855a07f7d25a3f56a37f108ec0f92c32d6fcb78aa29c697a40591e58b37618109927d1e10d8e4eb026f103d57f638a7df341ebc767c0ca6

  • SSDEEP

    192:QaMNWx+c1RApp3s49Xk8t1RApp3s49Xk82K:QaMNWUfs49Xk8is49Xk8R

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      91f4641ec25ce0e627692a356d6aaf46

    • SHA1

      23e85f9ca34cbaf825449f7c01b0926537262769

    • SHA256

      cb3071169b57757ec0a6ae35a560e6b60e0573706fd30facf0855aafff92b6f7

    • SHA512

      8e6b7d73d971c0cb6855a07f7d25a3f56a37f108ec0f92c32d6fcb78aa29c697a40591e58b37618109927d1e10d8e4eb026f103d57f638a7df341ebc767c0ca6

    • SSDEEP

      192:QaMNWx+c1RApp3s49Xk8t1RApp3s49Xk82K:QaMNWUfs49Xk8is49Xk8R

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks