General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241028-p32ybszbrd

  • MD5

    58d1b8c00233a71a8cf19695103ffb70

  • SHA1

    55a4ba351843ae5763a52ea12f51cf6374a68196

  • SHA256

    8e58f870d5bbf4af422a72ba39ebee137c5f63c0ece2133e1eba1bb7c61b0abf

  • SHA512

    7b3869a66fe25acbc9af2ed50f7eafc39c4ef64a8fb7bd75adda5f1a0fb49ee3469d8cc56cc807880ea2adcb737f0eec666c8ad55691733c45329bf1f83c9105

  • SSDEEP

    192:4gYL6mthZF4FpaKrsYqGcc3r4FthclgYL6moZF4zaKrsYX3r4Ftq7:WhZF4FsGcc3r4FthceZF4X3r4Ftq7

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      58d1b8c00233a71a8cf19695103ffb70

    • SHA1

      55a4ba351843ae5763a52ea12f51cf6374a68196

    • SHA256

      8e58f870d5bbf4af422a72ba39ebee137c5f63c0ece2133e1eba1bb7c61b0abf

    • SHA512

      7b3869a66fe25acbc9af2ed50f7eafc39c4ef64a8fb7bd75adda5f1a0fb49ee3469d8cc56cc807880ea2adcb737f0eec666c8ad55691733c45329bf1f83c9105

    • SSDEEP

      192:4gYL6mthZF4FpaKrsYqGcc3r4FthclgYL6moZF4zaKrsYX3r4Ftq7:WhZF4FsGcc3r4FthceZF4X3r4Ftq7

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks