General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241029-xh22laxhre

  • MD5

    1721a98ad1288054b91dce95e7e34a9a

  • SHA1

    ee7b8d4cfc882c2efc3654d870d5ab978a7f1195

  • SHA256

    306aa96e03b52430e1abe06ff417f8f81386e8010edc220215142c44d05eb285

  • SHA512

    a86a7fb442605c49e881e7e7547ffe2909360ef0c9fa426388755657f94c539ec620621c437101b8808bad7b2eb3ea887bce64e5deb9abdaaa78cf5dd1d7503c

  • SSDEEP

    96:YbabSbp4EBvD2qiLTRTJTsV1mUcg8XrvLT7TXT6J5XLUYtLwsSLkoHELLnt/+/uw:Rd11nfvj6J5Xt+UJAwFd1Zvj6J5rAwd

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      1721a98ad1288054b91dce95e7e34a9a

    • SHA1

      ee7b8d4cfc882c2efc3654d870d5ab978a7f1195

    • SHA256

      306aa96e03b52430e1abe06ff417f8f81386e8010edc220215142c44d05eb285

    • SHA512

      a86a7fb442605c49e881e7e7547ffe2909360ef0c9fa426388755657f94c539ec620621c437101b8808bad7b2eb3ea887bce64e5deb9abdaaa78cf5dd1d7503c

    • SSDEEP

      96:YbabSbp4EBvD2qiLTRTJTsV1mUcg8XrvLT7TXT6J5XLUYtLwsSLkoHELLnt/+/uw:Rd11nfvj6J5Xt+UJAwFd1Zvj6J5rAwd

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks