General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241110-jmhlvssgra

  • MD5

    e9d9273d3ad356a576128a3361d659b9

  • SHA1

    275839b2ddbcb18d1ab674ff9a054fdacfb4063b

  • SHA256

    827a1b7f0fc701f3cda492a926fb7e5ba3d5dbde922d8dfb442b28bd6531d226

  • SHA512

    8a2a08293eb9276f60a6b7bda8b0d4da36f185b7f36db59a4a3b88fe532fad73f589a2210714c8082c12c4f5a98a5247c14d64e2240d68886b358c724f130396

  • SSDEEP

    192:nPbgl9WGphSf7Kq5R9eSu+T+bia3m8dw5RXeSUia3m8doPbgl9ZphSf7v:t6q5R9eSu+T+K5RXeS1

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      e9d9273d3ad356a576128a3361d659b9

    • SHA1

      275839b2ddbcb18d1ab674ff9a054fdacfb4063b

    • SHA256

      827a1b7f0fc701f3cda492a926fb7e5ba3d5dbde922d8dfb442b28bd6531d226

    • SHA512

      8a2a08293eb9276f60a6b7bda8b0d4da36f185b7f36db59a4a3b88fe532fad73f589a2210714c8082c12c4f5a98a5247c14d64e2240d68886b358c724f130396

    • SSDEEP

      192:nPbgl9WGphSf7Kq5R9eSu+T+bia3m8dw5RXeSUia3m8doPbgl9ZphSf7v:t6q5R9eSu+T+K5RXeS1

    • Contacts a large (2153) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks