General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241030-mns1rs1hpr

  • MD5

    9d2ef9cfdacc88079e347f4109d9b482

  • SHA1

    8a714b6853e1fc9b4cdb09b0df87896223b59dc1

  • SHA256

    2d871d5535afbfea97c7f3fe40517d59eee1ca2c289e347ce9c994ada6203a63

  • SHA512

    38aa57ab2e1d7c7e7f52a47e8771ceb7379e567ba450eef8491124d19ac59e623fbbc4c6692d02dca761673331517704c52a9ac0c0460ba2575f6fb82dec34b6

  • SSDEEP

    192:No8lqK/wWwuGZF0bbe931ZF0bbzYo8lqKK:BwW3GZF0bboFZF0bbP

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      9d2ef9cfdacc88079e347f4109d9b482

    • SHA1

      8a714b6853e1fc9b4cdb09b0df87896223b59dc1

    • SHA256

      2d871d5535afbfea97c7f3fe40517d59eee1ca2c289e347ce9c994ada6203a63

    • SHA512

      38aa57ab2e1d7c7e7f52a47e8771ceb7379e567ba450eef8491124d19ac59e623fbbc4c6692d02dca761673331517704c52a9ac0c0460ba2575f6fb82dec34b6

    • SSDEEP

      192:No8lqK/wWwuGZF0bbe931ZF0bbzYo8lqKK:BwW3GZF0bboFZF0bbP

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks