General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241029-a73m4a1grq

  • MD5

    2bb043fa81f7298e8bba7928029c23b7

  • SHA1

    915b1525363e389043c2ef1f9bfefd4b0b6e5585

  • SHA256

    f12ee9d1c13d7f7dae921f8afbeb04408812302e32f11edf5f457cfb3a8f0ddf

  • SHA512

    0d566eb7eae109bc2ff779e739a7ed7db59aab344f8d4cf05d6fc884fb8b3316287db6c756e8471e663abfb5a7b64ad5cc240e44ad5ce3c23e8e30643df966a9

  • SSDEEP

    96:mvdVkm0EpWqdG/W8OanWmH/S1hZ4w3bdVkyZ0EpWq1GDmdFuOanWmHLjUS:mHAW8OanWmH/S5EOanWmHX

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      2bb043fa81f7298e8bba7928029c23b7

    • SHA1

      915b1525363e389043c2ef1f9bfefd4b0b6e5585

    • SHA256

      f12ee9d1c13d7f7dae921f8afbeb04408812302e32f11edf5f457cfb3a8f0ddf

    • SHA512

      0d566eb7eae109bc2ff779e739a7ed7db59aab344f8d4cf05d6fc884fb8b3316287db6c756e8471e663abfb5a7b64ad5cc240e44ad5ce3c23e8e30643df966a9

    • SSDEEP

      96:mvdVkm0EpWqdG/W8OanWmH/S1hZ4w3bdVkyZ0EpWq1GDmdFuOanWmHLjUS:mHAW8OanWmH/S5EOanWmHX

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks