General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241120-d5w93svler

  • MD5

    cd0626c90d5b47a6ce5eb6f42ffca214

  • SHA1

    cb84412f073e780cfdb5dcfcdba11f9c7fde9e0a

  • SHA256

    01b083f3a3bfa8feee984c83cb4f33526298df0f0e7fd2d1b339114c80ce0ca9

  • SHA512

    8057fed2d3a40d66d63406782fa34020627f4754e4bdb4a4641f869ccbf5d9e2f8568791a9c9db4b6d5c24617a9f75e48a666e78bda34ed37a4c164593b6ca0b

  • SSDEEP

    192:FZ5dN2u2iicj/auztWWz75dN2uuiicj/OR+V:FZ5dN2u+uztWM75dN2uSRU

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      cd0626c90d5b47a6ce5eb6f42ffca214

    • SHA1

      cb84412f073e780cfdb5dcfcdba11f9c7fde9e0a

    • SHA256

      01b083f3a3bfa8feee984c83cb4f33526298df0f0e7fd2d1b339114c80ce0ca9

    • SHA512

      8057fed2d3a40d66d63406782fa34020627f4754e4bdb4a4641f869ccbf5d9e2f8568791a9c9db4b6d5c24617a9f75e48a666e78bda34ed37a4c164593b6ca0b

    • SSDEEP

      192:FZ5dN2u2iicj/auztWWz75dN2uuiicj/OR+V:FZ5dN2u+uztWM75dN2uSRU

    • Contacts a large (2019) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks