General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241121-md8ngasaml

  • MD5

    456d18e88229695ec48121c8a61d19dd

  • SHA1

    f150b8f54e5439a20273cb97837006150e6c55ac

  • SHA256

    ee06e4cbf1285bfe61e7847dbdc807b5011ef76d78cd14cf70228c7fb001939c

  • SHA512

    c371c3651c6c6d0e643fe3a445a032d01477451ae301dde621380b552d88398623c470dd8eeb64d374abd9fd10ddf5755618f018be00c888870e0a4f624f7b06

  • SSDEEP

    192:mAs44Ans0vPUPcPPKWFLvO4L8Yea7rKrWr5KyC7jn+37uiV7wgHKWm7y+I8EKQA+:7SKPKWUnTaIO3livFT6YSKPKW6

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      456d18e88229695ec48121c8a61d19dd

    • SHA1

      f150b8f54e5439a20273cb97837006150e6c55ac

    • SHA256

      ee06e4cbf1285bfe61e7847dbdc807b5011ef76d78cd14cf70228c7fb001939c

    • SHA512

      c371c3651c6c6d0e643fe3a445a032d01477451ae301dde621380b552d88398623c470dd8eeb64d374abd9fd10ddf5755618f018be00c888870e0a4f624f7b06

    • SSDEEP

      192:mAs44Ans0vPUPcPPKWFLvO4L8Yea7rKrWr5KyC7jn+37uiV7wgHKWm7y+I8EKQA+:7SKPKWUnTaIO3livFT6YSKPKW6

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Contacts a large (1864) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks