General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241030-1aqv5ssqdl

  • MD5

    46ddc1f6a2c5d75a2bae70aa1965d97d

  • SHA1

    1c44b6db78394eb141f99d9726e4e75fe6150b22

  • SHA256

    bc788758314de8a595eb7869adffb940198a0b99c418c4841c2787aa924414c6

  • SHA512

    8e6142ab5848c6b49e046e653439c13cce0bcdfe418212954e3a0ec85f46cc4932af1e53c7291f6d99b42f5ccd94a9d29b3a2056e9159b86debcaf2d4dd44723

  • SSDEEP

    192:AXXiD3XSZdIbz578qQH+Kyjxc1d4B1HPZdIbzlryXXiD34n/pKyy1d4B1/:Vn78qJKyjC1d4B1HkroKyy1d4B1/

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      46ddc1f6a2c5d75a2bae70aa1965d97d

    • SHA1

      1c44b6db78394eb141f99d9726e4e75fe6150b22

    • SHA256

      bc788758314de8a595eb7869adffb940198a0b99c418c4841c2787aa924414c6

    • SHA512

      8e6142ab5848c6b49e046e653439c13cce0bcdfe418212954e3a0ec85f46cc4932af1e53c7291f6d99b42f5ccd94a9d29b3a2056e9159b86debcaf2d4dd44723

    • SSDEEP

      192:AXXiD3XSZdIbz578qQH+Kyjxc1d4B1HPZdIbzlryXXiD34n/pKyy1d4B1/:Vn78qJKyjC1d4B1HkroKyy1d4B1/

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks