Resubmissions

09/10/2024, 12:51

241009-p31p9svcql 10

09/10/2024, 01:43

241009-b5hetazemq 7

09/10/2024, 01:30

241009-bww7lstajb 6

08/10/2024, 22:36

241008-2h9hwstgrq 8

08/10/2024, 21:55

241008-1s9qza1akm 10

08/10/2024, 19:59

241008-yqgajavamc 7

08/10/2024, 19:11

241008-xwd7pawdmk 10

08/10/2024, 18:43

241008-xc4cgaxaqh 7

07/10/2024, 15:30

241007-sxe36azbpr 3

General

  • Target

    AnyDesk.exe

  • Size

    4.8MB

  • Sample

    241008-2h9hwstgrq

  • MD5

    ecae8b9c820ce255108f6050c26c37a1

  • SHA1

    42333349841ddcec2b5c073abc0cae651bb03e5f

  • SHA256

    1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069

  • SHA512

    9dc317682d4a89351e876b47f57e7fd26176f054b7322433c2c02dd074aabf8bfb19e6d1137a4b3ee6cd3463eaf8c0de124385928c561bdfe38440f336035ed4

  • SSDEEP

    49152:meqV5ZTNR7GCogeeQO+f2roC8b9vIT2jDKW4q8TrdzRplNOBLE7Rm1ebw4Tf/Eex:cX1T7bL0KrCqKDV4Jnd1ZOQ7R3rr/f6K

Malware Config

Targets

    • Target

      AnyDesk.exe

    • Size

      4.8MB

    • MD5

      ecae8b9c820ce255108f6050c26c37a1

    • SHA1

      42333349841ddcec2b5c073abc0cae651bb03e5f

    • SHA256

      1a70f4eef11fbecb721b9bab1c9ff43a8c4cd7b2cafef08c033c77070c6fe069

    • SHA512

      9dc317682d4a89351e876b47f57e7fd26176f054b7322433c2c02dd074aabf8bfb19e6d1137a4b3ee6cd3463eaf8c0de124385928c561bdfe38440f336035ed4

    • SSDEEP

      49152:meqV5ZTNR7GCogeeQO+f2roC8b9vIT2jDKW4q8TrdzRplNOBLE7Rm1ebw4Tf/Eex:cX1T7bL0KrCqKDV4Jnd1ZOQ7R3rr/f6K

    Score
    8/10
    • Path Permission

      Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.

    • Gatekeeper Bypass

      Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.

    • File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.

MITRE ATT&CK Enterprise v15

Tasks