General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241124-kbge4axqgp

  • MD5

    0af379b28e85dfce41e7fc8861d805c6

  • SHA1

    f1e5057c774b046f9eb9ac98dbe382d1dbfc97ec

  • SHA256

    fb5ee91c0df4ed146dd8bfd39aa07ca4ebf01b4bffcf6924aed8eba81f0f0e08

  • SHA512

    85f4dd5f65046f65d12961fa0ae9f14d9ec929bfb3fd082191f49c70cc67f392c2c62ccb5cab64c3b847d8ba45b6bb073e0c3f540ad64fe226d40f349ddef6d3

  • SSDEEP

    192:mYI8amarlNL7X7D7Ebzdz3Pl77fC78EJ4Q4A48V5f7H+HyHRGmPP+PyPNCiO7maT:r3CidN8V5fL6uRGmQ8dN8V5P6uRGmB

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      0af379b28e85dfce41e7fc8861d805c6

    • SHA1

      f1e5057c774b046f9eb9ac98dbe382d1dbfc97ec

    • SHA256

      fb5ee91c0df4ed146dd8bfd39aa07ca4ebf01b4bffcf6924aed8eba81f0f0e08

    • SHA512

      85f4dd5f65046f65d12961fa0ae9f14d9ec929bfb3fd082191f49c70cc67f392c2c62ccb5cab64c3b847d8ba45b6bb073e0c3f540ad64fe226d40f349ddef6d3

    • SSDEEP

      192:mYI8amarlNL7X7D7Ebzdz3Pl77fC78EJ4Q4A48V5f7H+HyHRGmPP+PyPNCiO7maT:r3CidN8V5fL6uRGmQ8dN8V5P6uRGmB

    • Contacts a large (2205) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks