General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241125-j6pjhstkhr

  • MD5

    747b8345f3612d35549d1bab11e30196

  • SHA1

    8b239baf781200145912fbcc64c46168d7f09fe2

  • SHA256

    c79ab0c501bb9f67602ded8b5f2eefe6ed347421585d3507580d5e70f0f0db46

  • SHA512

    b6fbe756307aa4c57bbb192804f6e517c63ef03939bad331e1304c8b6ff2c0e82c5b16916533d15c62696f04f2dbb1e0535c7ed6403ac2b6478d36997edce994

  • SSDEEP

    96:PRJkI8scWD3b9eGyBNVGWbyT9Cjt9tokDAGRJSI8pOtuBNVGW1QD3b9eGX9N0TVV:PRJkScWD3b9eGxRC5RJ7L3b9eGA

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      747b8345f3612d35549d1bab11e30196

    • SHA1

      8b239baf781200145912fbcc64c46168d7f09fe2

    • SHA256

      c79ab0c501bb9f67602ded8b5f2eefe6ed347421585d3507580d5e70f0f0db46

    • SHA512

      b6fbe756307aa4c57bbb192804f6e517c63ef03939bad331e1304c8b6ff2c0e82c5b16916533d15c62696f04f2dbb1e0535c7ed6403ac2b6478d36997edce994

    • SSDEEP

      96:PRJkI8scWD3b9eGyBNVGWbyT9Cjt9tokDAGRJSI8pOtuBNVGW1QD3b9eGX9N0TVV:PRJkScWD3b9eGxRC5RJ7L3b9eGA

    • Contacts a large (2074) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks