Félix Brezo · @febrezo
156 followers · 213 posts · Server mastodon.social

From a perspective, the would be:

- .003: Command and Scripting Interpreter: Unix Shell. SHC payloads to be run still need a shell to be identified in the system and that the code inside the payload is, in fact, a shell script.
- .002: Obfuscated Files or Information: Software Packed with .
- : Debugger Evasion by using SHC with '-r'.
- : Ingress Tool Transfer by downloading payloads from Github.
- : Resource Hijacking with .

#threatintelligence #ttps #t1059 #t1027 #shc #t1622 #t1105 #t1496 #xmrig

Last updated 2 years ago

Félix Brezo · @febrezo
156 followers · 212 posts · Server mastodon.social

In this regard, I've been working with this evening to understand how it works and I've discovered that it is pretty easy to use it to ship complex scripts onto a single executable file.

The result is Bobominer (github.com/febrezo/bobominer), a stupidly simple PoC of how I've used to create a binary that downloads from Github to download and configure it to start mining.

I didn't expect that it was so easy to package things this way. .

#shc #xmrig #threatintelligence #t1496

Last updated 2 years ago

Félix Brezo · @febrezo
156 followers · 211 posts · Server mastodon.social

I've come across this interesting article by AhnLab about how SHC is being used to deploy malicious payloads on GNU/Linux systems: "Shc Linux Malware Installing CoinMiner"

asec.ahnlab.com/en/45182/

#threatintelligence #mitre #t1496 #gnu #linux #coinminer

Last updated 2 years ago