Resubmissions

28/06/2024, 10:28

240628-mhzlcsvarc 8

27/06/2024, 14:47

240627-r5228aydkq 1

27/06/2024, 14:29

240627-rtyknaxgqq 1

General

  • Target

    check.txt

  • Size

    66B

  • Sample

    240628-mhzlcsvarc

  • MD5

    4c887559dafd4faa8ff0572e169686e5

  • SHA1

    251f58cca8fd3e3732e309a85cfb74f6de9fcde2

  • SHA256

    89dac6512986604b7699aea5b75c7cb2a93e9e2babf07ea868ee17488ed6bf77

  • SHA512

    129a5ebc4d4a087048c897884cfffecf0b9d3ef10d7de4703197878cf86a9331e6e2de1057f43af4fc35f7cf196c21bda634d38ea0c496f60da3051d74a5c0c3

Malware Config

Targets

    • Target

      check.txt

    • Size

      66B

    • MD5

      4c887559dafd4faa8ff0572e169686e5

    • SHA1

      251f58cca8fd3e3732e309a85cfb74f6de9fcde2

    • SHA256

      89dac6512986604b7699aea5b75c7cb2a93e9e2babf07ea868ee17488ed6bf77

    • SHA512

      129a5ebc4d4a087048c897884cfffecf0b9d3ef10d7de4703197878cf86a9331e6e2de1057f43af4fc35f7cf196c21bda634d38ea0c496f60da3051d74a5c0c3

    Score
    8/10
    • Path Permission

      Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.

    • Gatekeeper Bypass

      Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.

    • File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.

MITRE ATT&CK Enterprise v15

Tasks