General
-
Target
check.txt
-
Size
66B
-
Sample
240628-mhzlcsvarc
-
MD5
4c887559dafd4faa8ff0572e169686e5
-
SHA1
251f58cca8fd3e3732e309a85cfb74f6de9fcde2
-
SHA256
89dac6512986604b7699aea5b75c7cb2a93e9e2babf07ea868ee17488ed6bf77
-
SHA512
129a5ebc4d4a087048c897884cfffecf0b9d3ef10d7de4703197878cf86a9331e6e2de1057f43af4fc35f7cf196c21bda634d38ea0c496f60da3051d74a5c0c3
Static task
static1
Malware Config
Targets
-
-
Target
check.txt
-
Size
66B
-
MD5
4c887559dafd4faa8ff0572e169686e5
-
SHA1
251f58cca8fd3e3732e309a85cfb74f6de9fcde2
-
SHA256
89dac6512986604b7699aea5b75c7cb2a93e9e2babf07ea868ee17488ed6bf77
-
SHA512
129a5ebc4d4a087048c897884cfffecf0b9d3ef10d7de4703197878cf86a9331e6e2de1057f43af4fc35f7cf196c21bda634d38ea0c496f60da3051d74a5c0c3
-
Path Permission
Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.
-
Gatekeeper Bypass
Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.
-
File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.
-