General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241123-3bp2cayjgq

  • MD5

    aecf915310e1b57ef84716e66275886b

  • SHA1

    eaa2d293615be82294c26ce4ff7a6bce993a2ecb

  • SHA256

    f5c6280c3983c239bf19b631fc87ab2890152c0a2006b38e0fd28149fcfdc131

  • SHA512

    f892615bfb3e780d6e1e64bff72196a66fe9e933e68d91c63cda8b389afb37f7468f5ab14b3a326236b6f3087003b47f7465dd932ac592ecb3d8f0feb674e351

  • SSDEEP

    96:sf/9QyowY9pP4c92aKRZeNNLQ12R8+4q92aKRZy3NNLQ1yYiB86xf/gFC7owY9py:CQyowY9pPr1R1owY9py

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      aecf915310e1b57ef84716e66275886b

    • SHA1

      eaa2d293615be82294c26ce4ff7a6bce993a2ecb

    • SHA256

      f5c6280c3983c239bf19b631fc87ab2890152c0a2006b38e0fd28149fcfdc131

    • SHA512

      f892615bfb3e780d6e1e64bff72196a66fe9e933e68d91c63cda8b389afb37f7468f5ab14b3a326236b6f3087003b47f7465dd932ac592ecb3d8f0feb674e351

    • SSDEEP

      96:sf/9QyowY9pP4c92aKRZeNNLQ12R8+4q92aKRZy3NNLQ1yYiB86xf/gFC7owY9py:CQyowY9pPr1R1owY9py

    • Contacts a large (2071) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks