General
-
Target
bins.sh
-
Size
10KB
-
Sample
241030-jcx9kayfmc
-
MD5
e5d51c94bd2ed9634163925ec647ffd3
-
SHA1
74c2cc8ae7c06e0e5ce0570b7f12cc5d1aa4d1a2
-
SHA256
bf6801d80d6f23d710dd2c8f4b988b2f408b76d013891fbda822a9395e4d4fcd
-
SHA512
80f01f6844c5f2f6644ffbf63aa98fef07e5e39a7ee7278da331c43b3c76df89672f39213635fe6844a50ede3fbde127577edeb0501e928b39fa4463f7708234
-
SSDEEP
96:S2BW3PoB357+mofa5E0UBv0hfGjpUiz5ELSBps3PoB357jwQzG:lBW3PoB3J+moUE/sDOm3PoB3Ji
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240611-en
Malware Config
Targets
-
-
Target
bins.sh
-
Size
10KB
-
MD5
e5d51c94bd2ed9634163925ec647ffd3
-
SHA1
74c2cc8ae7c06e0e5ce0570b7f12cc5d1aa4d1a2
-
SHA256
bf6801d80d6f23d710dd2c8f4b988b2f408b76d013891fbda822a9395e4d4fcd
-
SHA512
80f01f6844c5f2f6644ffbf63aa98fef07e5e39a7ee7278da331c43b3c76df89672f39213635fe6844a50ede3fbde127577edeb0501e928b39fa4463f7708234
-
SSDEEP
96:S2BW3PoB357+mofa5E0UBv0hfGjpUiz5ELSBps3PoB357jwQzG:lBW3PoB3J+moUE/sDOm3PoB3Ji
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Renames itself
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-