General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241126-anbp9s1kcq

  • MD5

    37357ffd59785e960234aeda3f40d4ac

  • SHA1

    242f8c3cabbfb4fc2269ac9cb4f70799e359605a

  • SHA256

    c29e92ac6566d1ec9d59ad27fbfcd464525e7c534aab1ab1788982760262ac1f

  • SHA512

    dfd720863adfcf722a8920a49badf4ded1d0b3581e7d554c71ff809cff20b0029093f13050ae92c694fe201ebbe6c4ab988e0d6cc88682cad2f05646459d8b4a

  • SSDEEP

    192:JMVZbmWrYr4r6r5r1rcRZWBrYr4r6r5r1r0N:qVZbmw2W0htcRsp2W0ht0N

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      37357ffd59785e960234aeda3f40d4ac

    • SHA1

      242f8c3cabbfb4fc2269ac9cb4f70799e359605a

    • SHA256

      c29e92ac6566d1ec9d59ad27fbfcd464525e7c534aab1ab1788982760262ac1f

    • SHA512

      dfd720863adfcf722a8920a49badf4ded1d0b3581e7d554c71ff809cff20b0029093f13050ae92c694fe201ebbe6c4ab988e0d6cc88682cad2f05646459d8b4a

    • SSDEEP

      192:JMVZbmWrYr4r6r5r1rcRZWBrYr4r6r5r1r0N:qVZbmw2W0htcRsp2W0ht0N

    • Contacts a large (2065) amount of remote hosts

      This may indicate a network scan to discover remotely running services.

    • Creates a large amount of network flows

      This may indicate a network scan to discover remotely running services.

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks