General
-
Target
bins.sh
-
Size
10KB
-
Sample
241031-l9bg6svkfy
-
MD5
98a18e866b60daae3e685f11a1ba8de3
-
SHA1
e75c8b59ac625180b75dc09236815562ee7c7516
-
SHA256
daa972a65e4384ed36b00c3de5b45b5b31f4f5e6d8662bc8e31a6d7f3970ed86
-
SHA512
447380c5ee983ce566fd27ea9b62fb7da4fd0bab865cda320bfd4909ce03ac7a85a62919f6966e0007196ba30b6cac337efe2907d476d09ff680786ec835a33d
-
SSDEEP
192:kc45CiAzRJ0VRYnXJa3IAEb66so0KdzKVRYnX5cAEb664o04vc45Ci6RJ1:kc45CiAzRJxa3IVj6c45Ci6RJ1
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240611-en
Malware Config
Targets
-
-
Target
bins.sh
-
Size
10KB
-
MD5
98a18e866b60daae3e685f11a1ba8de3
-
SHA1
e75c8b59ac625180b75dc09236815562ee7c7516
-
SHA256
daa972a65e4384ed36b00c3de5b45b5b31f4f5e6d8662bc8e31a6d7f3970ed86
-
SHA512
447380c5ee983ce566fd27ea9b62fb7da4fd0bab865cda320bfd4909ce03ac7a85a62919f6966e0007196ba30b6cac337efe2907d476d09ff680786ec835a33d
-
SSDEEP
192:kc45CiAzRJ0VRYnXJa3IAEb66so0KdzKVRYnX5cAEb664o04vc45Ci6RJ1:kc45CiAzRJxa3IVj6c45Ci6RJ1
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Renames itself
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1