General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241031-l9bg6svkfy

  • MD5

    98a18e866b60daae3e685f11a1ba8de3

  • SHA1

    e75c8b59ac625180b75dc09236815562ee7c7516

  • SHA256

    daa972a65e4384ed36b00c3de5b45b5b31f4f5e6d8662bc8e31a6d7f3970ed86

  • SHA512

    447380c5ee983ce566fd27ea9b62fb7da4fd0bab865cda320bfd4909ce03ac7a85a62919f6966e0007196ba30b6cac337efe2907d476d09ff680786ec835a33d

  • SSDEEP

    192:kc45CiAzRJ0VRYnXJa3IAEb66so0KdzKVRYnX5cAEb664o04vc45Ci6RJ1:kc45CiAzRJxa3IVj6c45Ci6RJ1

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      98a18e866b60daae3e685f11a1ba8de3

    • SHA1

      e75c8b59ac625180b75dc09236815562ee7c7516

    • SHA256

      daa972a65e4384ed36b00c3de5b45b5b31f4f5e6d8662bc8e31a6d7f3970ed86

    • SHA512

      447380c5ee983ce566fd27ea9b62fb7da4fd0bab865cda320bfd4909ce03ac7a85a62919f6966e0007196ba30b6cac337efe2907d476d09ff680786ec835a33d

    • SSDEEP

      192:kc45CiAzRJ0VRYnXJa3IAEb66so0KdzKVRYnX5cAEb664o04vc45Ci6RJ1:kc45CiAzRJxa3IVj6c45Ci6RJ1

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks