General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241101-kh5q9syhrl

  • MD5

    68cd19bf772a479fd73cdf6185b3aa94

  • SHA1

    9c4297f23e02ac3ace1616b95cb134215f46cc8d

  • SHA256

    322aa1165a3d70358defac2b5e225a6305be451ce6bfa75a464b9825e6a5a098

  • SHA512

    1f2c09440ef92040792f110a54100c797ff08e158e9a5513b9537da5de22e35a85b4d7ebffe0e193ded3f04a33c4ebcd8fd543cb7618fc5ad31d0eb6d7a576bc

  • SSDEEP

    192:bem/4cI8hp1kLrtU04rqiEkgkskPkKkCkNF8efltfFwnjkp1kLrY04rqiKkgksk8:A8hp1kLrt3LPIhh2F8eLpp1kLrHLPIh6

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      68cd19bf772a479fd73cdf6185b3aa94

    • SHA1

      9c4297f23e02ac3ace1616b95cb134215f46cc8d

    • SHA256

      322aa1165a3d70358defac2b5e225a6305be451ce6bfa75a464b9825e6a5a098

    • SHA512

      1f2c09440ef92040792f110a54100c797ff08e158e9a5513b9537da5de22e35a85b4d7ebffe0e193ded3f04a33c4ebcd8fd543cb7618fc5ad31d0eb6d7a576bc

    • SSDEEP

      192:bem/4cI8hp1kLrtU04rqiEkgkskPkKkCkNF8efltfFwnjkp1kLrY04rqiKkgksk8:A8hp1kLrt3LPIhh2F8eLpp1kLrHLPIh6

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks