General

  • Target

    Без названия (6).jpeg

  • Size

    5KB

  • Sample

    240619-rtdv9asbnh

  • MD5

    7c4d49a5e38de92e025393e87c7c1a01

  • SHA1

    a07ad457f043765192351192519ff76d6b883755

  • SHA256

    ae4c87462d803acca65685774b07f1eba7d7db9322a46568408ead28548dd37c

  • SHA512

    cffd34861b9ce177217bd80b50a821aa589a0e3647ccafa58af53fe5f371ddf4db30f6d49a62dea7dd8bc1357d380901e74997172cc96d78f80708390caacdb6

  • SSDEEP

    96:N0oRFGxZ5EdYixFHve4b54lAH3BH+a2yJLLNttsCMOZa6bFit/u:N0iFGH5Ea4FPe4GsBH+cV4O5botm

Malware Config

Targets

    • Target

      Без названия (6).jpeg

    • Size

      5KB

    • MD5

      7c4d49a5e38de92e025393e87c7c1a01

    • SHA1

      a07ad457f043765192351192519ff76d6b883755

    • SHA256

      ae4c87462d803acca65685774b07f1eba7d7db9322a46568408ead28548dd37c

    • SHA512

      cffd34861b9ce177217bd80b50a821aa589a0e3647ccafa58af53fe5f371ddf4db30f6d49a62dea7dd8bc1357d380901e74997172cc96d78f80708390caacdb6

    • SSDEEP

      96:N0oRFGxZ5EdYixFHve4b54lAH3BH+a2yJLLNttsCMOZa6bFit/u:N0iFGH5Ea4FPe4GsBH+cV4O5botm

    Score
    8/10
    • Path Permission

      Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.

    • Gatekeeper Bypass

      Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.

    • File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.

MITRE ATT&CK Enterprise v15

Tasks