General

  • Target

    f57892b0ef5678cf46a32964789fca7b2395527e05c98105bb4dd81d1da78a34.sh

  • Size

    816KB

  • Sample

    241121-ks31esvnbp

  • MD5

    0e1f041d4e0c23943e0b046520c9cd07

  • SHA1

    d7d93deda88b8c0615eb45861d80a4f48525ab3a

  • SHA256

    f57892b0ef5678cf46a32964789fca7b2395527e05c98105bb4dd81d1da78a34

  • SHA512

    677f6b1268c8ed8f8f62b2149ea41c44df741bd44ba8dbcb987732049d2889676c6610d823350ace5d13d9a93c9a1b47021dde3bc4e9645cbfb9714b7fd7866e

  • SSDEEP

    6144:aOtG23KlUK0LZqV8FxkZ5zPulEdHqZ7rhhVbGdQ3CPlHMpsgdce2Nkba/Jp5IsTj:WiLd5dawKnDTyw3psYEI

Malware Config

Targets

    • Target

      f57892b0ef5678cf46a32964789fca7b2395527e05c98105bb4dd81d1da78a34.sh

    • Size

      816KB

    • MD5

      0e1f041d4e0c23943e0b046520c9cd07

    • SHA1

      d7d93deda88b8c0615eb45861d80a4f48525ab3a

    • SHA256

      f57892b0ef5678cf46a32964789fca7b2395527e05c98105bb4dd81d1da78a34

    • SHA512

      677f6b1268c8ed8f8f62b2149ea41c44df741bd44ba8dbcb987732049d2889676c6610d823350ace5d13d9a93c9a1b47021dde3bc4e9645cbfb9714b7fd7866e

    • SSDEEP

      6144:aOtG23KlUK0LZqV8FxkZ5zPulEdHqZ7rhhVbGdQ3CPlHMpsgdce2Nkba/Jp5IsTj:WiLd5dawKnDTyw3psYEI

    • Looks for SUID binaries

      Searches the filesystem for potential binaries to be used for privilege escalation (common during reconnaissance activity).

    • OS Credential Dumping

      Adversaries may attempt to dump credentials to use it in password cracking.

    • Abuse Elevation Control Mechanism: Sudo and Sudo Caching

      Abuse sudo or cached sudo credentials to execute code.

    • Reads AppArmor ptrace settings

      Discovery of allowed ptrace capabilities by AppArmor.

    • Checks hardware identifiers (DMI)

      Checks DMI information which indicate if the system is a virtual machine.

    • Enumerates running processes

      Discovers information about currently running processes on the system

    • Reads data from the clipboard

      Attempts to collect data stored in the clipboard using xclip tool.

    • Reads hardware information

      Accesses system info like serial numbers, manufacturer names etc.

    • Reads network interface configuration

      Fetches information about one or more active network interfaces.

    • Virtualization/Sandbox Evasion: Time Based Evasion

      Adversaries may detect and evade virtualized environments and sandboxes.

MITRE ATT&CK Enterprise v15

Tasks