General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241124-baxw1s1rhn

  • MD5

    b00520b81436571f9d68b3b03239fce8

  • SHA1

    743af9d3dc86e980ab8fa05c689f8434920bf1d1

  • SHA256

    144f5672af2c29c1ea3d4bfb0047806051d2d431f93295d74ae25cae1062326e

  • SHA512

    787a60732a86201c95ca447bd67f77ddf05cc0fc71ecec250a697e7faf0d33e1094452ab088ad3c98f6eeba8edbdbebf61d06efb1aeb262365f9ad8c69f0a85c

  • SSDEEP

    192:tz5NhOHvcEdIUg89lmvLw7lP/5RqTfkIUg8NhOHvmR5RqTfI9lmvLQg:tz5NhOHvcEdIUg89lmvLw7lPNIUg8Nh6

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      b00520b81436571f9d68b3b03239fce8

    • SHA1

      743af9d3dc86e980ab8fa05c689f8434920bf1d1

    • SHA256

      144f5672af2c29c1ea3d4bfb0047806051d2d431f93295d74ae25cae1062326e

    • SHA512

      787a60732a86201c95ca447bd67f77ddf05cc0fc71ecec250a697e7faf0d33e1094452ab088ad3c98f6eeba8edbdbebf61d06efb1aeb262365f9ad8c69f0a85c

    • SSDEEP

      192:tz5NhOHvcEdIUg89lmvLw7lP/5RqTfkIUg8NhOHvmR5RqTfI9lmvLQg:tz5NhOHvcEdIUg89lmvLw7lPNIUg8Nh6

    • Contacts a large (1730) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks