General
-
Target
https://www.google.com/url?rct=j&sa=t&url=https://www.mundodomarketing.com.br/do-velho-ao-novo-atualizando-o-varejo-com-ia/&ct=ga&cd=CAEYASoTNjgyMTE2MjM0ODYzMzk5NTM1OTIaY2NiNWEwMjcwNzg0YzRhZTpjb206cHQ6QlI&usg=AOvVaw2Q1VHgg8hvPykRyCWJ1Esf
-
Sample
240820-t6qfxssenf
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://www.google.com/url?rct=j&sa=t&url=https://www.mundodomarketing.com.br/do-velho-ao-novo-atualizando-o-varejo-com-ia/&ct=ga&cd=CAEYASoTNjgyMTE2MjM0ODYzMzk5NTM1OTIaY2NiNWEwMjcwNzg0YzRhZTpjb206cHQ6QlI&usg=AOvVaw2Q1VHgg8hvPykRyCWJ1Esf
Resource
macos-20240711.1-en
Malware Config
Targets
-
-
Target
https://www.google.com/url?rct=j&sa=t&url=https://www.mundodomarketing.com.br/do-velho-ao-novo-atualizando-o-varejo-com-ia/&ct=ga&cd=CAEYASoTNjgyMTE2MjM0ODYzMzk5NTM1OTIaY2NiNWEwMjcwNzg0YzRhZTpjb206cHQ6QlI&usg=AOvVaw2Q1VHgg8hvPykRyCWJ1Esf
-
Path Permission
Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.
-
Gatekeeper Bypass
Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.
-
File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.
-