General

  • Target

    obf_wrKV6I7nUNLV0vOzk9EPHINj2UaF01DI3xOX5J0D8o1M0INpWN683yuMX6jnsGg3.lua

  • Size

    88KB

  • Sample

    240615-nt3mtstajq

  • MD5

    f7e285ead3ed0a7787d7986f337529e1

  • SHA1

    844339ebac9cb1c154e1786e9b1db8655cd97d91

  • SHA256

    b81c9b1b0c14a344d9aa498adf893600b80a69ad755fc734433bafa6f446ed95

  • SHA512

    130718d0d3127e588e0b2ba5fb0531bfed5a1ebca552a9a64548fe7fdabd59ad43ec86203c45455575c5d6b84cdee197f6cd6ef257381c48e72586c874510b30

  • SSDEEP

    1536:2xBKREy5U3FC0ffaNdn31a1fm/WtOdgk43QgyiMDEjFvoLT:2x8p5U3w3TgkeMDKG

Malware Config

Targets

    • Target

      obf_wrKV6I7nUNLV0vOzk9EPHINj2UaF01DI3xOX5J0D8o1M0INpWN683yuMX6jnsGg3.lua

    • Size

      88KB

    • MD5

      f7e285ead3ed0a7787d7986f337529e1

    • SHA1

      844339ebac9cb1c154e1786e9b1db8655cd97d91

    • SHA256

      b81c9b1b0c14a344d9aa498adf893600b80a69ad755fc734433bafa6f446ed95

    • SHA512

      130718d0d3127e588e0b2ba5fb0531bfed5a1ebca552a9a64548fe7fdabd59ad43ec86203c45455575c5d6b84cdee197f6cd6ef257381c48e72586c874510b30

    • SSDEEP

      1536:2xBKREy5U3FC0ffaNdn31a1fm/WtOdgk43QgyiMDEjFvoLT:2x8p5U3w3TgkeMDKG

    Score
    8/10
    • Path Permission

      Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.

    • Gatekeeper Bypass

      Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.

    • File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.

MITRE ATT&CK Enterprise v15

Tasks