General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241121-txtf8ashrh

  • MD5

    44dbdf99e6e4adb46218f00c0a9b4062

  • SHA1

    6179b5866f487612dcd78a791cb78ed5096f3e28

  • SHA256

    91f347e4dbea2b9e58273e262a94e7b0198f795050e3461c25fd3a5b4454e63f

  • SHA512

    701d0e91d596ff158c4717923a5279da562597e0e7a974adec6ce26a0647954d8cb13b13440f5a97faba176fca7ea657e045034d24006fe2d919d4559811a07f

  • SSDEEP

    192:myJypybUAnwuwiwONfVQ7uiUay+zm7mfmvKaI7TXH79lUgQDUcM8HhHhHEhD7XDC:zIobUASoF6OvKaI/12FFEhDcu6OvKaoj

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      44dbdf99e6e4adb46218f00c0a9b4062

    • SHA1

      6179b5866f487612dcd78a791cb78ed5096f3e28

    • SHA256

      91f347e4dbea2b9e58273e262a94e7b0198f795050e3461c25fd3a5b4454e63f

    • SHA512

      701d0e91d596ff158c4717923a5279da562597e0e7a974adec6ce26a0647954d8cb13b13440f5a97faba176fca7ea657e045034d24006fe2d919d4559811a07f

    • SSDEEP

      192:myJypybUAnwuwiwONfVQ7uiUay+zm7mfmvKaI7TXH79lUgQDUcM8HhHhHEhD7XDC:zIobUASoF6OvKaI/12FFEhDcu6OvKaoj

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks