General
-
Target
cli
-
Size
66KB
-
Sample
240618-qyq6pswbrb
-
MD5
215bf6d34bc4f1cbedb338c909991fcc
-
SHA1
f3d6435a061c49487452a9bff21c88fec0be8a0d
-
SHA256
8e355e8d7380db4d11ce8d3b29c5b7ec9bf2dcb0791e05c6004ab339afd37949
-
SHA512
03c9a7dc89acfb0ab3de070623842f3886d12a39f7fe2bfc096d82bc5b9820872646a40755ce011457116a60b573d9c995ad8fc36c7b69797e06ed9be6997763
-
SSDEEP
1536:VZChPpvdVbH8EyYOjwNQDXqGaRpRLP5My2oe:kFcUNQD6Tbk
Static task
static1
Behavioral task
behavioral1
Sample
cli.html
Resource
android-33-x64-arm64-20240611.1-en
Behavioral task
behavioral2
Sample
cli.html
Resource
macos-20240611-en
Behavioral task
behavioral3
Sample
cli.html
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral4
Sample
cli.html
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral5
Sample
cli.html
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral6
Sample
cli.html
Resource
debian9-mipsel-20240418-en
Malware Config
Targets
-
-
Target
cli
-
Size
66KB
-
MD5
215bf6d34bc4f1cbedb338c909991fcc
-
SHA1
f3d6435a061c49487452a9bff21c88fec0be8a0d
-
SHA256
8e355e8d7380db4d11ce8d3b29c5b7ec9bf2dcb0791e05c6004ab339afd37949
-
SHA512
03c9a7dc89acfb0ab3de070623842f3886d12a39f7fe2bfc096d82bc5b9820872646a40755ce011457116a60b573d9c995ad8fc36c7b69797e06ed9be6997763
-
SSDEEP
1536:VZChPpvdVbH8EyYOjwNQDXqGaRpRLP5My2oe:kFcUNQD6Tbk
-
Path Permission
Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.
-
Gatekeeper Bypass
Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.
-
File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.
-