General

  • Target

    711cc08ac13301a68a153568c26353fe.jpg

  • Size

    37KB

  • Sample

    240619-vnhtssyhlp

  • MD5

    8948295a5feb042afdf0db471387967c

  • SHA1

    14ebcd41cffc2e9ff2e05c4e4de92fb62082969e

  • SHA256

    b87c22bd0ec96179598ee5d83059bdfeef5426a9952b3009f84cc6ceb3c0b43f

  • SHA512

    17b3f5eaeb5de81adfa2fb6f912e5ed73ec67cdf0f1789b5e2d192c7ba69eeab532266ce3b27a12e5732211a0bef0842b81cc3db62433f76612ce92dbebc0112

  • SSDEEP

    768:etgk0RR3srvDaQVoMhKR0u+26DwOveRRfvRZZc+qkXGQowVFQxZ2fqj:etF0n8L9bhK+u+IOvgRA+qkXGQ1kLuqj

Malware Config

Targets

    • Target

      711cc08ac13301a68a153568c26353fe.jpg

    • Size

      37KB

    • MD5

      8948295a5feb042afdf0db471387967c

    • SHA1

      14ebcd41cffc2e9ff2e05c4e4de92fb62082969e

    • SHA256

      b87c22bd0ec96179598ee5d83059bdfeef5426a9952b3009f84cc6ceb3c0b43f

    • SHA512

      17b3f5eaeb5de81adfa2fb6f912e5ed73ec67cdf0f1789b5e2d192c7ba69eeab532266ce3b27a12e5732211a0bef0842b81cc3db62433f76612ce92dbebc0112

    • SSDEEP

      768:etgk0RR3srvDaQVoMhKR0u+26DwOveRRfvRZZc+qkXGQowVFQxZ2fqj:etF0n8L9bhK+u+IOvgRA+qkXGQ1kLuqj

    Score
    8/10
    • Path Permission

      Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.

    • Gatekeeper Bypass

      Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.

    • File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.

MITRE ATT&CK Enterprise v15

Tasks