General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241108-swbdksvdlr

  • MD5

    28da49fd9438da5ee3fa13fc53b5bd0c

  • SHA1

    bdd8fdf541c1c40a2327d0e17239da521f2a36cd

  • SHA256

    183a2ccc798f2b45c7dd21be4a9866112342cb9428136cb6ff80a522965dbf1d

  • SHA512

    4e766537fa0871ce6cdf5c1ecd6605929600ce0e87b186b266f60fa72176f4ab499fd59c622b87fe08a5b10649e76c435768fb44dfbe90f513a08f17e3abc405

  • SSDEEP

    96:gAsnGO60kOLUak421tkCWXLlkkPBN9ckCNwbTzzkcdfXLlkk8gBN9ckCFTgKYfkp:YQCCWXLlkk0NwbTvkclXLlkk+6kcaz28

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      28da49fd9438da5ee3fa13fc53b5bd0c

    • SHA1

      bdd8fdf541c1c40a2327d0e17239da521f2a36cd

    • SHA256

      183a2ccc798f2b45c7dd21be4a9866112342cb9428136cb6ff80a522965dbf1d

    • SHA512

      4e766537fa0871ce6cdf5c1ecd6605929600ce0e87b186b266f60fa72176f4ab499fd59c622b87fe08a5b10649e76c435768fb44dfbe90f513a08f17e3abc405

    • SSDEEP

      96:gAsnGO60kOLUak421tkCWXLlkkPBN9ckCNwbTzzkcdfXLlkk8gBN9ckCFTgKYfkp:YQCCWXLlkk0NwbTvkclXLlkk+6kcaz28

    • Contacts a large (2121) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks