Resubmissions

03-07-2024 20:49

240703-zmh6dswhml 1

03-07-2024 20:46

240703-zkgjsaybnb 7

General

  • Target

    installer.sh

  • Size

    1KB

  • Sample

    240703-zkgjsaybnb

  • MD5

    9079ca55e025e2b0330bdf2552e9e4df

  • SHA1

    bd7f00351e01a52869d630a1bc3eb1abcfb77d3d

  • SHA256

    2946e81a3e1f614b4d81c773dc36c78c80ee11dde2588219da921084c38673af

  • SHA512

    e11574c1c1edca41e62285c3aaeab88c9ed281bdac6d9f7b7c7c871551b6019f8e07d2dbce6ffcb8ec8bdea1a8e1bd3264cab01940729e8085fa0dfb9cb947b3

Malware Config

Targets

    • Target

      installer.sh

    • Size

      1KB

    • MD5

      9079ca55e025e2b0330bdf2552e9e4df

    • SHA1

      bd7f00351e01a52869d630a1bc3eb1abcfb77d3d

    • SHA256

      2946e81a3e1f614b4d81c773dc36c78c80ee11dde2588219da921084c38673af

    • SHA512

      e11574c1c1edca41e62285c3aaeab88c9ed281bdac6d9f7b7c7c871551b6019f8e07d2dbce6ffcb8ec8bdea1a8e1bd3264cab01940729e8085fa0dfb9cb947b3

    Score
    7/10
    • Exfiltration Over Alternative Protocol

      Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

Hide Artifacts

1
T1564

Resource Forking

1
T1564.009

Exfiltration

Exfiltration Over Alternative Protocol

1
T1048

Exfiltration Over Unencrypted Non-C2 Protocol

1
T1048.003

Tasks