General
-
Target
EternalDecaySetup_v.4.56.dmg
-
Size
874KB
-
Sample
240914-pq79kstdqj
-
MD5
ce0b6c581255f9e47f1b4e2e1bafbc9b
-
SHA1
47e692f9c8b7a74bd64a506a5589b5c63dd16c6a
-
SHA256
3235e753ca0ea63328c1828ab539da958bb46597d8060683f649dcdb0fb49b9d
-
SHA512
6207e7e3d1d1de16bf328bdc14a4ad6b23b31ccd429f1f57bc2145503f2fb590186e4b8546c946a47d7cd0ac1b5290d2743a31ad45029ce81c56530e5c342186
-
SSDEEP
12288:GeYqEi/z+aZYEFv6pS+WZiG7nQ8K4aW1lnmNgWhC1/h8XVeDflwO+n6ldj:EY7NYEFvdBiG7nrDNnEgWc/1wO
Static task
static1
Behavioral task
behavioral1
Sample
EternalDecaySetup_v.4.56.dmg
Resource
macos-20240711.1-en
Behavioral task
behavioral2
Sample
EternalDecaySetup/EternalDecaySetup
Resource
macos-20240711.1-en
Malware Config
Targets
-
-
Target
EternalDecaySetup_v.4.56.dmg
-
Size
874KB
-
MD5
ce0b6c581255f9e47f1b4e2e1bafbc9b
-
SHA1
47e692f9c8b7a74bd64a506a5589b5c63dd16c6a
-
SHA256
3235e753ca0ea63328c1828ab539da958bb46597d8060683f649dcdb0fb49b9d
-
SHA512
6207e7e3d1d1de16bf328bdc14a4ad6b23b31ccd429f1f57bc2145503f2fb590186e4b8546c946a47d7cd0ac1b5290d2743a31ad45029ce81c56530e5c342186
-
SSDEEP
12288:GeYqEi/z+aZYEFv6pS+WZiG7nQ8K4aW1lnmNgWhC1/h8XVeDflwO+n6ldj:EY7NYEFvdBiG7nrDNnEgWc/1wO
Score8/10-
Identifies hardware specifics through system_profiler
-
Exfiltration Over Alternative Protocol
Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel.
-
File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.
-
-
-
Target
EternalDecaySetup/EternalDecaySetup
-
Size
197KB
-
MD5
813c9029a82dedeba3dbb4488516e8f9
-
SHA1
d79030a3c95a283566ff7e6fb80bfaa4ff25bc59
-
SHA256
f1b047207f730f1cd70660b87f475b7f6d693c4fe0d7fee39ecd8e71912d47a8
-
SHA512
549de350dacf07541b757b8808072350fb3c1a5e8a7492664a78fd0a7ce0832919f69012920c75f4eead0edc9a22d4f94b9ddf5277c24d7566e65dbe5831b703
-
SSDEEP
1536:mPHRRL1Eb2drDINyG78C7jsN3RL1Eb2drDINyG78C7M:mvRR1hdrkNb7Ru3R1hdrkNb7R
Score8/10-
Identifies hardware specifics through system_profiler
-
Exfiltration Over Alternative Protocol
Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel.
-