General
-
Target
The-MALWARE-Repo
-
Size
299KB
-
Sample
240914-ybkz6sscma
-
MD5
779de164115a5525dcc72356a622c063
-
SHA1
d628f3d56df4d4fa4857ced85e85279d6fd0f08c
-
SHA256
1832e3fe9dd044a16468786ca07f682573c99ed5695a4ad22927f74bef8baffe
-
SHA512
989698e369cc4fe91dae5c0318a8d27951626fe66c20c11261e6d4aa375124d3e88d695e33449e944e6d45f484c61db62deeaeac52455f2fc9f33c22a950c3fe
-
SSDEEP
6144:15oQS3uokeOvHS1d1+CNs8wbiWQ+9rvZJT3CqbMrhryf65NRPaCieMjAkvCJv1Vj:DoQS3uokeOvHS1d1+CNs8wbiWQ+9rvZc
Static task
static1
Malware Config
Targets
-
-
Target
The-MALWARE-Repo
-
Size
299KB
-
MD5
779de164115a5525dcc72356a622c063
-
SHA1
d628f3d56df4d4fa4857ced85e85279d6fd0f08c
-
SHA256
1832e3fe9dd044a16468786ca07f682573c99ed5695a4ad22927f74bef8baffe
-
SHA512
989698e369cc4fe91dae5c0318a8d27951626fe66c20c11261e6d4aa375124d3e88d695e33449e944e6d45f484c61db62deeaeac52455f2fc9f33c22a950c3fe
-
SSDEEP
6144:15oQS3uokeOvHS1d1+CNs8wbiWQ+9rvZJT3CqbMrhryf65NRPaCieMjAkvCJv1Vj:DoQS3uokeOvHS1d1+CNs8wbiWQ+9rvZc
-
Path Permission
Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.
-
Gatekeeper Bypass
Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.
-
File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.
-