General
-
Target
installer.sh
-
Size
1KB
-
Sample
240703-zkgjsaybnb
-
MD5
9079ca55e025e2b0330bdf2552e9e4df
-
SHA1
bd7f00351e01a52869d630a1bc3eb1abcfb77d3d
-
SHA256
2946e81a3e1f614b4d81c773dc36c78c80ee11dde2588219da921084c38673af
-
SHA512
e11574c1c1edca41e62285c3aaeab88c9ed281bdac6d9f7b7c7c871551b6019f8e07d2dbce6ffcb8ec8bdea1a8e1bd3264cab01940729e8085fa0dfb9cb947b3
Static task
static1
Behavioral task
behavioral1
Sample
installer.sh
Resource
macos-20240611-en
Malware Config
Targets
-
-
Target
installer.sh
-
Size
1KB
-
MD5
9079ca55e025e2b0330bdf2552e9e4df
-
SHA1
bd7f00351e01a52869d630a1bc3eb1abcfb77d3d
-
SHA256
2946e81a3e1f614b4d81c773dc36c78c80ee11dde2588219da921084c38673af
-
SHA512
e11574c1c1edca41e62285c3aaeab88c9ed281bdac6d9f7b7c7c871551b6019f8e07d2dbce6ffcb8ec8bdea1a8e1bd3264cab01940729e8085fa0dfb9cb947b3
Score7/10-
Exfiltration Over Alternative Protocol
Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel.
-