General

  • Target

    bins.sh

  • Size

    10KB

  • Sample

    241208-n3z83aspgy

  • MD5

    31dc22b2f58cb4fd2235a8080172f950

  • SHA1

    20a3f9d62d6ac309bbdce809ae89d03eb11b7b0d

  • SHA256

    c16f438b47325b1aba61f70cae21fb51989259fd33369861514b57fb451f5f2f

  • SHA512

    e3c591b6b189fad96f20f108e83c52e724d08d00d8b7ab9ac6c8959339eabff2d1166747b5b16f5e80ea5fe21b249fce23e0381b4481236c1d62c49c4b054387

  • SSDEEP

    96:YGGsSGGsqGGsfsbGsOsxLB5oLoeoOouvZZv6LzVz1zUILB5QTLb3jfzNLndueiix:kk57SVuU2l5T+fPN7Hl5T+fP1

Malware Config

Targets

    • Target

      bins.sh

    • Size

      10KB

    • MD5

      31dc22b2f58cb4fd2235a8080172f950

    • SHA1

      20a3f9d62d6ac309bbdce809ae89d03eb11b7b0d

    • SHA256

      c16f438b47325b1aba61f70cae21fb51989259fd33369861514b57fb451f5f2f

    • SHA512

      e3c591b6b189fad96f20f108e83c52e724d08d00d8b7ab9ac6c8959339eabff2d1166747b5b16f5e80ea5fe21b249fce23e0381b4481236c1d62c49c4b054387

    • SSDEEP

      96:YGGsSGGsqGGsfsbGsOsxLB5oLoeoOouvZZv6LzVz1zUILB5QTLb3jfzNLndueiix:kk57SVuU2l5T+fPN7Hl5T+fP1

    • File and Directory Permissions Modification

      Adversaries may modify file or directory permissions to evade defenses.

    • Executes dropped EXE

    • Renames itself

    • Creates/modifies Cron job

      Cron allows running tasks on a schedule, and is commonly used for malware persistence.

    • Enumerates running processes

      Discovers information about currently running processes on the system

MITRE ATT&CK Enterprise v15

Tasks