General
-
Target
IP_Request.scpt
-
Size
832B
-
Sample
240609-2kca6sge59
-
MD5
341bc169c4c2fb198791f957726a8ac7
-
SHA1
ba1753d11dc36a5a06e67e709606e2e4a8c00c6b
-
SHA256
82c38c3a0f156775d8d84801c2e23ee9a8c82c61aabd2df197fae83256f216c9
-
SHA512
70482b90a36bb70a6c62e208d7f1e80abbd879c36dd785176235a61920b64f38c607a396be702cde51096900dca3c06453442dded315268361197250dd1cc1bf
Static task
static1
Behavioral task
behavioral1
Sample
IP_Request.scpt
Resource
macos-20240410-en
Malware Config
Targets
-
-
Target
IP_Request.scpt
-
Size
832B
-
MD5
341bc169c4c2fb198791f957726a8ac7
-
SHA1
ba1753d11dc36a5a06e67e709606e2e4a8c00c6b
-
SHA256
82c38c3a0f156775d8d84801c2e23ee9a8c82c61aabd2df197fae83256f216c9
-
SHA512
70482b90a36bb70a6c62e208d7f1e80abbd879c36dd785176235a61920b64f38c607a396be702cde51096900dca3c06453442dded315268361197250dd1cc1bf
Score7/10-
Exfiltration Over Alternative Protocol
Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel.
-
File Permission
Adversaries may modify file permissions/attributes to evade access control lists (ACLs) and access protected files.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Hide Artifacts
1Resource Forking
1