Malicious Shell Scripts Evolution
Malicious actors constantly improve and optimize their routines and techniques, such as their shell scripts capability to obfuscate and deliver payloads. To maximize profits and evade improving detection and mitigation technologies,cybercriminals will employ even previously documented and discovered techniques for other operating systems or combine them with new ones.
The Unix-programming community commonly uses shell scripts as a simple way to execute multiple Linux commands within a single file. Many users do this as part of a regular operational workload manipulating files, executing programs,and printing text.
A shell interpreter is available in every Unix machine, it is also an interesting and dynamic tool abused like- Redis instances, expose Docker APIs or remove rival cryptocurrency miners by malicious actors.
Indicators of Compromise
File Hash
1aaf7bc48ff75e870db4fe6ec0b3ed9d99876d7e2fb3d5c4613cca92bbb95e1b
bea4008c0f7df9941121ddedc387429b2f26a718f46d589608b993c33f69b828
0742efecbd7af343213a50cc5fd5cd2f8475613cfe6fb51f4296a7ec4533940d
3c7faf7512565d86b1ec4fe2810b2006b75c3476b4a5b955f0141d9a1c237d38
3eeaa9d4a44c2e1da05decfce54975f7510b31113d8361ff344c98d3ddd30bf4
543ceebd292e0e2c324372f3ab82401015f78b60778c6e38f438f98861fd9a2d
882473c3100389e563b05051ae1b843f8dd24c807a30acf0c6749cd38137876b
c82074344cf24327fbb15fd5b8276a7681f77ccacef7acc146b4cffa46dabf62
eaf9dd8efe43dcf606ec0a531d5a46a9d84e80b54aa4a019fa93884f18c707c3
f65bea9c1242ca92d4038a05252a70cf70f16618cf548b78f120783dfb9ccd0e
Comments
Post a Comment