General
-
Target
bins.sh
-
Size
10KB
-
Sample
241030-f8allawmax
-
MD5
01697b21b3afa51d0a5f26bc4b89555f
-
SHA1
933b96f65d73029d7eb99789107fbcbf6b3eaf03
-
SHA256
2ec6ab8d4267abb1ce34c0a6c5de0e4ca8d750f511528320ec28548adfc63eb2
-
SHA512
076464e6c3f8906e137bb75ba9fc9de728227b9e91c07c435672f2e7cc1e70319ad88acf6f247d2f94c0e66ca4232cbd3c48f6313f464ab6eb2241db67ef0326
-
SSDEEP
192:5LDIZtKED+qzAgOES6JYstVqk0FcGe42sodxk0mGe42so6LDIZtS+qzAgTS6JYs0:5LDIZtKE2AgcGe42sodcGe42so6LDIZf
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240226-en
Malware Config
Targets
-
-
Target
bins.sh
-
Size
10KB
-
MD5
01697b21b3afa51d0a5f26bc4b89555f
-
SHA1
933b96f65d73029d7eb99789107fbcbf6b3eaf03
-
SHA256
2ec6ab8d4267abb1ce34c0a6c5de0e4ca8d750f511528320ec28548adfc63eb2
-
SHA512
076464e6c3f8906e137bb75ba9fc9de728227b9e91c07c435672f2e7cc1e70319ad88acf6f247d2f94c0e66ca4232cbd3c48f6313f464ab6eb2241db67ef0326
-
SSDEEP
192:5LDIZtKED+qzAgOES6JYstVqk0FcGe42sodxk0mGe42so6LDIZtS+qzAgTS6JYs0:5LDIZtKE2AgcGe42sodcGe42so6LDIZf
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Renames itself
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1