General
-
Target
bins.sh
-
Size
10KB
-
Sample
241028-tn3crstcqn
-
MD5
d41afa47fc6a06a1cfb7b25f1b6510db
-
SHA1
1ef345877ccc2780055713bec262b92657b1e4a1
-
SHA256
754972bec007493d2c80bb80e68340689d10e492c7747fc68b085746b799ca0a
-
SHA512
5ce676421868d2fd93aaf0307d70c8f856c56a53859c0275e01f4c1fe15644ee25c18c06208b6e0a579333df7622d73b330cf65c898bb939f2f4fd773f4de320
-
SSDEEP
96:YlFdLqi3SYL4L5RK/VV1oLDfVVjV/VBziTzDYmLxi2mDxTvni6iUpBYKCak8LHbN:SI6/2FO1Y0q0/cl1GC
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240226-en
Malware Config
Targets
-
-
Target
bins.sh
-
Size
10KB
-
MD5
d41afa47fc6a06a1cfb7b25f1b6510db
-
SHA1
1ef345877ccc2780055713bec262b92657b1e4a1
-
SHA256
754972bec007493d2c80bb80e68340689d10e492c7747fc68b085746b799ca0a
-
SHA512
5ce676421868d2fd93aaf0307d70c8f856c56a53859c0275e01f4c1fe15644ee25c18c06208b6e0a579333df7622d73b330cf65c898bb939f2f4fd773f4de320
-
SSDEEP
96:YlFdLqi3SYL4L5RK/VV1oLDfVVjV/VBziTzDYmLxi2mDxTvni6iUpBYKCak8LHbN:SI6/2FO1Y0q0/cl1GC
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Renames itself
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1