General
-
Target
bins.sh
-
Size
10KB
-
Sample
241211-mgcefaymbt
-
MD5
406a3ef5ca0b6741cfdb93766923811c
-
SHA1
75979edb2e57be5b492da50ba893a293884b0cd5
-
SHA256
0aaeab657bd005ba7caabd00e43d1f0504cc0705a29110166cc9ce7710f1586b
-
SHA512
3e57c0814fcb99dce5a1c6884654a6a987348721734070e55a0a273e23b20e770c517aa0ceeec53a8fb07f51b6499f49cefdf05a2e9bd28c174d7001e44b776d
-
SSDEEP
192:dO28yspdcnHXWnh9CnPOUsKh9CnPsAv0pdcnHX4:dOHyspdcnHmnh9CnPOUsKh9CnPsA8pd7
Static task
static1
Behavioral task
behavioral1
Sample
bins.sh
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral2
Sample
bins.sh
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral3
Sample
bins.sh
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral4
Sample
bins.sh
Resource
debian9-mipsel-20240226-en
Malware Config
Targets
-
-
Target
bins.sh
-
Size
10KB
-
MD5
406a3ef5ca0b6741cfdb93766923811c
-
SHA1
75979edb2e57be5b492da50ba893a293884b0cd5
-
SHA256
0aaeab657bd005ba7caabd00e43d1f0504cc0705a29110166cc9ce7710f1586b
-
SHA512
3e57c0814fcb99dce5a1c6884654a6a987348721734070e55a0a273e23b20e770c517aa0ceeec53a8fb07f51b6499f49cefdf05a2e9bd28c174d7001e44b776d
-
SSDEEP
192:dO28yspdcnHXWnh9CnPOUsKh9CnPsAv0pdcnHX4:dOHyspdcnHmnh9CnPOUsKh9CnPsA8pd7
-
Xorbot family
-
Contacts a large (896) amount of remote hosts
This may indicate a network scan to discover remotely running services.
-
File and Directory Permissions Modification
Adversaries may modify file or directory permissions to evade defenses.
-
Executes dropped EXE
-
Renames itself
-
Creates a large amount of network flows
This may indicate a network scan to discover remotely running services.
-
Creates/modifies Cron job
Cron allows running tasks on a schedule, and is commonly used for malware persistence.
-
Enumerates running processes
Discovers information about currently running processes on the system
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Virtualization/Sandbox Evasion
1System Checks
1