General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241121-q5vsgaxkdk

  • MD5

    407eedfd0fc31b79bcc6095f30040ee7

  • SHA1

    2719b6893563784feb6a862fa94b326302684614

  • SHA256

    f7bfdfcb073cff1ac3e6e7850b9143978f8d5732c1c36ed8866b2d96666e203a

  • SHA512

    070764927cbbbdde09de2978a464399a4b14354ac73a6c798e76b7cbf581bca621b09f638e8eb91d8a61498c85d72b454370b56e0134304924a45ecfcdd57262

  • SSDEEP

    192:6Oq+jKfddd9dmHnmx1KGHnmx1kSddd9dD:6Oq+jKfddd9daUSddd9dD

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      407eedfd0fc31b79bcc6095f30040ee7

    • SHA1

      2719b6893563784feb6a862fa94b326302684614

    • SHA256

      f7bfdfcb073cff1ac3e6e7850b9143978f8d5732c1c36ed8866b2d96666e203a

    • SHA512

      070764927cbbbdde09de2978a464399a4b14354ac73a6c798e76b7cbf581bca621b09f638e8eb91d8a61498c85d72b454370b56e0134304924a45ecfcdd57262

    • SSDEEP

      192:6Oq+jKfddd9dmHnmx1KGHnmx1kSddd9dD:6Oq+jKfddd9daUSddd9dD

    • Contacts a large (1524) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks