General

  • Target

    IP_Request.scpt

  • Size

    832B

  • Sample

    240609-2kca6sge59

  • MD5

    341bc169c4c2fb198791f957726a8ac7

  • SHA1

    ba1753d11dc36a5a06e67e709606e2e4a8c00c6b

  • SHA256

    82c38c3a0f156775d8d84801c2e23ee9a8c82c61aabd2df197fae83256f216c9

  • SHA512

    70482b90a36bb70a6c62e208d7f1e80abbd879c36dd785176235a61920b64f38c607a396be702cde51096900dca3c06453442dded315268361197250dd1cc1bf

Malware Config

Targets

    • Target

      IP_Request.scpt

    • Size

      832B

    • MD5

      341bc169c4c2fb198791f957726a8ac7

    • SHA1

      ba1753d11dc36a5a06e67e709606e2e4a8c00c6b

    • SHA256

      82c38c3a0f156775d8d84801c2e23ee9a8c82c61aabd2df197fae83256f216c9

    • SHA512

      70482b90a36bb70a6c62e208d7f1e80abbd879c36dd785176235a61920b64f38c607a396be702cde51096900dca3c06453442dded315268361197250dd1cc1bf

    • Exfiltration Over Alternative Protocol

      Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel.

    • File Permission

      Adversaries may modify file permissions/attributes to evade access control lists (ACLs) and access protected files.

MITRE ATT&CK Enterprise v15

Tasks