General

  • Target

    ab67616d0000b27391353d0d96d1031c3ed56ed6.jpg

  • Size

    28KB

  • Sample

    240811-n49twssfpb

  • MD5

    76cd63d386a4437a2777612f94737dde

  • SHA1

    44e56b057103bd563a145382e570860e68561d63

  • SHA256

    8c111ff35555fad582dfc575b14c9e8feb30696005dab300776b27a9897fbbbb

  • SHA512

    7ed7492cd685d2fb8dd73fbda2dc1390169573f27e1755d4ed1bec3622ddf7a2ab74325902e94bc97bd7bd9c5b7ee480211cb7daef6e953addcbc814ae77dd80

  • SSDEEP

    768:tX+qj089YOa72pEN2cyMUtTaUxMzSmBZS:tOqjKO42ps9HOTaoMS

Malware Config

Targets

    • Target

      ab67616d0000b27391353d0d96d1031c3ed56ed6.jpg

    • Size

      28KB

    • MD5

      76cd63d386a4437a2777612f94737dde

    • SHA1

      44e56b057103bd563a145382e570860e68561d63

    • SHA256

      8c111ff35555fad582dfc575b14c9e8feb30696005dab300776b27a9897fbbbb

    • SHA512

      7ed7492cd685d2fb8dd73fbda2dc1390169573f27e1755d4ed1bec3622ddf7a2ab74325902e94bc97bd7bd9c5b7ee480211cb7daef6e953addcbc814ae77dd80

    • SSDEEP

      768:tX+qj089YOa72pEN2cyMUtTaUxMzSmBZS:tOqjKO42ps9HOTaoMS

    Score
    8/10
    • Path Permission

      Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.

    • Gatekeeper Bypass

      Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.

    • File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.

MITRE ATT&CK Enterprise v15

Tasks