General

  • Target

    dupeutils-1.4.5.jar

  • Size

    22KB

  • Sample

    241013-wjqjhszcrc

  • MD5

    c1b430c6b71e3d7e1d7198d4df5b95b1

  • SHA1

    fd991602e352a629d0f549024ad4efbe1756f3ce

  • SHA256

    3f50fa792bb018997e5bd882b175886ccfd640132883c680d150dda45326f8fe

  • SHA512

    e97a76d6d506b0102389248f7a1e623be897359e0114a1e0b9c682e865b6f28c8dcd8c067fe11282510eec7c051a25ecbf25bae3d52a38f706682baf4db1999a

  • SSDEEP

    384:mo3w9gnthMhhbIOsxctlYAaNGux5Ub2SY3xfYZFzwKUZNq0lb/GOYi:X9nQvbUuLux+bzIJLq0gs

Malware Config

Targets

    • Target

      dupeutils-1.4.5.jar

    • Size

      22KB

    • MD5

      c1b430c6b71e3d7e1d7198d4df5b95b1

    • SHA1

      fd991602e352a629d0f549024ad4efbe1756f3ce

    • SHA256

      3f50fa792bb018997e5bd882b175886ccfd640132883c680d150dda45326f8fe

    • SHA512

      e97a76d6d506b0102389248f7a1e623be897359e0114a1e0b9c682e865b6f28c8dcd8c067fe11282510eec7c051a25ecbf25bae3d52a38f706682baf4db1999a

    • SSDEEP

      384:mo3w9gnthMhhbIOsxctlYAaNGux5Ub2SY3xfYZFzwKUZNq0lb/GOYi:X9nQvbUuLux+bzIJLq0gs

    • Path Permission

      Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.

    • Gatekeeper Bypass

      Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.

    • File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.

MITRE ATT&CK Enterprise v15

Tasks