Resubmissions

29-06-2024 07:53

240629-jrbzwatdqe 10

29-06-2024 07:51

240629-jpsvlswgrn 5

29-06-2024 07:48

240629-jnc3rswgqk 3

29-06-2024 07:37

240629-jf3y8atcpa 10

29-06-2024 07:36

240629-je8s3stcnd 8

29-06-2024 07:34

240629-jd4gzawfqq 1

29-06-2024 07:33

240629-jdq7mstcld 1

29-06-2024 07:29

240629-jbarwawfnj 7

General

  • Target

    The-MALWARE-Repo

  • Size

    284KB

  • Sample

    240629-je8s3stcnd

  • MD5

    1c0a02c3390b9fd77746574def84b1d1

  • SHA1

    2e62ae7936cf5b6398308f702ddbb06427091109

  • SHA256

    29dc64e0ada4c711d0452801d3364b2f44cf4bd52337547aaa2f40744da97cd1

  • SHA512

    4f62bc5c219a6fa412dc06653227561b10cb32d144be733e0b2e57dea24baa17683dc09b84c57237326e6909e27f42ea7e1f70032eeff455d12423364bc433a2

  • SSDEEP

    6144:ibRoQ02n9dH5M2vkm0y3Cl3pId9Rj9vvZJT3CqbMrhryfQNRPaCieMjAkvCJv1VZ:qRoQ02n9dH5M2vkm0y3Cl3pId9Rj9vvC

Malware Config

Targets

    • Target

      The-MALWARE-Repo

    • Size

      284KB

    • MD5

      1c0a02c3390b9fd77746574def84b1d1

    • SHA1

      2e62ae7936cf5b6398308f702ddbb06427091109

    • SHA256

      29dc64e0ada4c711d0452801d3364b2f44cf4bd52337547aaa2f40744da97cd1

    • SHA512

      4f62bc5c219a6fa412dc06653227561b10cb32d144be733e0b2e57dea24baa17683dc09b84c57237326e6909e27f42ea7e1f70032eeff455d12423364bc433a2

    • SSDEEP

      6144:ibRoQ02n9dH5M2vkm0y3Cl3pId9Rj9vvZJT3CqbMrhryfQNRPaCieMjAkvCJv1VZ:qRoQ02n9dH5M2vkm0y3Cl3pId9Rj9vvC

    Score
    8/10
    • Path Permission

      Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.

    • Gatekeeper Bypass

      Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.

    • File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.

MITRE ATT&CK Enterprise v15

Tasks