General
-
Target
Без названия (6).jpeg
-
Size
5KB
-
Sample
240619-rtdv9asbnh
-
MD5
7c4d49a5e38de92e025393e87c7c1a01
-
SHA1
a07ad457f043765192351192519ff76d6b883755
-
SHA256
ae4c87462d803acca65685774b07f1eba7d7db9322a46568408ead28548dd37c
-
SHA512
cffd34861b9ce177217bd80b50a821aa589a0e3647ccafa58af53fe5f371ddf4db30f6d49a62dea7dd8bc1357d380901e74997172cc96d78f80708390caacdb6
-
SSDEEP
96:N0oRFGxZ5EdYixFHve4b54lAH3BH+a2yJLLNttsCMOZa6bFit/u:N0iFGH5Ea4FPe4GsBH+cV4O5botm
Static task
static1
Behavioral task
behavioral1
Sample
Без названия (6).jpg
Resource
android-x64-arm64-20240611.1-en
Malware Config
Targets
-
-
Target
Без названия (6).jpeg
-
Size
5KB
-
MD5
7c4d49a5e38de92e025393e87c7c1a01
-
SHA1
a07ad457f043765192351192519ff76d6b883755
-
SHA256
ae4c87462d803acca65685774b07f1eba7d7db9322a46568408ead28548dd37c
-
SHA512
cffd34861b9ce177217bd80b50a821aa589a0e3647ccafa58af53fe5f371ddf4db30f6d49a62dea7dd8bc1357d380901e74997172cc96d78f80708390caacdb6
-
SSDEEP
96:N0oRFGxZ5EdYixFHve4b54lAH3BH+a2yJLLNttsCMOZa6bFit/u:N0iFGH5Ea4FPe4GsBH+cV4O5botm
-
Path Permission
Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.
-
Gatekeeper Bypass
Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.
-
File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.
-