General
-
Target
use this for vm.txt
-
Size
39B
-
Sample
240315-yvtresca72
-
MD5
85d1b8bb622cf9e5c8c6dca9987faacb
-
SHA1
8a4ab6244aead3d5b79e941657fa32aae12a183a
-
SHA256
f262224cdc799e0cb18c22723609a5e332b586dc884a1e63e6641ef4e58e1c2a
-
SHA512
06b4745baa5dc643d4e3651aeeef794564e892f0d6613d8d5122edc7754fb610742c5dce96cbc13d45df24913cc780fabd2b017ebeb7db7a8b6a9cd63f89597d
Static task
static1
Malware Config
Targets
-
-
Target
use this for vm.txt
-
Size
39B
-
MD5
85d1b8bb622cf9e5c8c6dca9987faacb
-
SHA1
8a4ab6244aead3d5b79e941657fa32aae12a183a
-
SHA256
f262224cdc799e0cb18c22723609a5e332b586dc884a1e63e6641ef4e58e1c2a
-
SHA512
06b4745baa5dc643d4e3651aeeef794564e892f0d6613d8d5122edc7754fb610742c5dce96cbc13d45df24913cc780fabd2b017ebeb7db7a8b6a9cd63f89597d
-
Path Permission
Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.
-
Gatekeeper Bypass
Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.
-
File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.
-