Overview
overview
8Static
static
1sample.html
windows7-x64
1sample.html
windows10-2004-x64
1sample.html
android-9-x86
1sample.html
android-10-x64
1sample.html
android-11-x64
1sample.html
macos-10.15-amd64
8sample.html
ubuntu-18.04-amd64
sample.html
debian-9-armhf
sample.html
debian-9-mips
sample.html
debian-9-mipsel
General
-
Target
sample
-
Size
19KB
-
Sample
240620-vg12sssdjq
-
MD5
7030b1e40adabfa91ee52c81c65257cc
-
SHA1
1920af0169c52de492edb199db45430148c2eed4
-
SHA256
d87360c3a4286dab91df70eca55e4b4f6520069fc5f1595272fcdd3f37f5af3e
-
SHA512
68ef5523ec85925bcbb5ecac16a1eba9f17463014a11745fb8ef351486f2a7a9db4fced14b4989d1e9d07707c88470a394c6477af0ebf69771dd25a10b0cd5e4
-
SSDEEP
384:I/kFspY1ocy454lbGaNsvhpNe9su3K2fa2hOwV0b0QfcNxCqcR1:I/kR1ocy4iEa+JpNasd2hOwSb0GYxQR1
Static task
static1
Behavioral task
behavioral1
Sample
sample.html
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
sample.html
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
sample.html
Resource
android-x86-arm-20240611.1-en
Behavioral task
behavioral4
Sample
sample.html
Resource
android-x64-20240611.1-en
Behavioral task
behavioral5
Sample
sample.html
Resource
android-x64-arm64-20240611.1-en
Behavioral task
behavioral6
Sample
sample.html
Resource
macos-20240611-en
Behavioral task
behavioral7
Sample
sample.html
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral8
Sample
sample.html
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral9
Sample
sample.html
Resource
debian9-mipsbe-20240418-en
Behavioral task
behavioral10
Sample
sample.html
Resource
debian9-mipsel-20240611-en
Malware Config
Targets
-
-
Target
sample
-
Size
19KB
-
MD5
7030b1e40adabfa91ee52c81c65257cc
-
SHA1
1920af0169c52de492edb199db45430148c2eed4
-
SHA256
d87360c3a4286dab91df70eca55e4b4f6520069fc5f1595272fcdd3f37f5af3e
-
SHA512
68ef5523ec85925bcbb5ecac16a1eba9f17463014a11745fb8ef351486f2a7a9db4fced14b4989d1e9d07707c88470a394c6477af0ebf69771dd25a10b0cd5e4
-
SSDEEP
384:I/kFspY1ocy454lbGaNsvhpNe9su3K2fa2hOwV0b0QfcNxCqcR1:I/kR1ocy4iEa+JpNasd2hOwSb0GYxQR1
-
Path Permission
Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.
-
Gatekeeper Bypass
Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.
-
File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Hide Artifacts
1Resource Forking
1Indicator Removal
1File Deletion
1Subvert Trust Controls
1Gatekeeper Bypass
1