General

  • Target

    use this for vm.txt

  • Size

    39B

  • Sample

    240315-yvtresca72

  • MD5

    85d1b8bb622cf9e5c8c6dca9987faacb

  • SHA1

    8a4ab6244aead3d5b79e941657fa32aae12a183a

  • SHA256

    f262224cdc799e0cb18c22723609a5e332b586dc884a1e63e6641ef4e58e1c2a

  • SHA512

    06b4745baa5dc643d4e3651aeeef794564e892f0d6613d8d5122edc7754fb610742c5dce96cbc13d45df24913cc780fabd2b017ebeb7db7a8b6a9cd63f89597d

Malware Config

Targets

    • Target

      use this for vm.txt

    • Size

      39B

    • MD5

      85d1b8bb622cf9e5c8c6dca9987faacb

    • SHA1

      8a4ab6244aead3d5b79e941657fa32aae12a183a

    • SHA256

      f262224cdc799e0cb18c22723609a5e332b586dc884a1e63e6641ef4e58e1c2a

    • SHA512

      06b4745baa5dc643d4e3651aeeef794564e892f0d6613d8d5122edc7754fb610742c5dce96cbc13d45df24913cc780fabd2b017ebeb7db7a8b6a9cd63f89597d

    Score
    8/10
    • Path Permission

      Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.

    • Gatekeeper Bypass

      Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.

    • File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.

MITRE ATT&CK Enterprise v15

Tasks