Resubmissions

19-06-2024 23:50

240619-3vv2psxemd 3

19-06-2024 23:50

240619-3vls2asarr 1

19-06-2024 23:49

240619-3ty2zasaqj 3

19-06-2024 23:47

240619-3syd2sxdpa 8

19-06-2024 23:42

240619-3p9mxaxcpb 6

General

  • Target

    one-punch-man-saitama-pfp-1.jpg

  • Size

    90KB

  • Sample

    240619-3syd2sxdpa

  • MD5

    abc0f06044b5335f651d4f59cf3f7650

  • SHA1

    dfc201aeb0bb4b35d66156c2f9fef8cfe2eb5809

  • SHA256

    734b47199989cd1ca7c47e98d3fb797875eb3169d629a3a405c588ecae2d82a2

  • SHA512

    5f64bba784f3653e76439ec5533a7a813b4af9f9f01cbc859c5d395f643770aace49b8fa22d89a554ab526846d7fb6826578ed495016c58da08b78aa4514eaca

  • SSDEEP

    1536:YzA5ihFqqOsM4AET3NxFBY9ygVD1f31jfUB3pIEsezIZHe9coc7Kgn:N5ihFIgAEvED1/580LnHe+oc+2

Malware Config

Targets

    • Target

      one-punch-man-saitama-pfp-1.jpg

    • Size

      90KB

    • MD5

      abc0f06044b5335f651d4f59cf3f7650

    • SHA1

      dfc201aeb0bb4b35d66156c2f9fef8cfe2eb5809

    • SHA256

      734b47199989cd1ca7c47e98d3fb797875eb3169d629a3a405c588ecae2d82a2

    • SHA512

      5f64bba784f3653e76439ec5533a7a813b4af9f9f01cbc859c5d395f643770aace49b8fa22d89a554ab526846d7fb6826578ed495016c58da08b78aa4514eaca

    • SSDEEP

      1536:YzA5ihFqqOsM4AET3NxFBY9ygVD1f31jfUB3pIEsezIZHe9coc7Kgn:N5ihFIgAEvED1/580LnHe+oc+2

    Score
    8/10
    • Path Permission

      Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.

    • Gatekeeper Bypass

      Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.

    • File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.

MITRE ATT&CK Enterprise v15

Tasks