Overview
overview
8Static
static
1URLScan
urlscan
1http://gamehack.yzz....
windows11-21h2-x64
3http://gamehack.yzz....
windows7-x64
3http://gamehack.yzz....
windows10-2004-x64
3http://gamehack.yzz....
windows11-21h2-x64
3http://gamehack.yzz....
android-13-x64
1http://gamehack.yzz....
android-10-x64
1http://gamehack.yzz....
android-11-x64
1http://gamehack.yzz....
android-13-x64
1http://gamehack.yzz....
android-9-x86
1http://gamehack.yzz....
macos-10.15-amd64
8http://gamehack.yzz....
macos-10.15-amd64
1http://gamehack.yzz....
debian-12-armhf
http://gamehack.yzz....
debian-12-armhf
http://gamehack.yzz....
debian-12-mipsel
http://gamehack.yzz....
debian-9-armhf
http://gamehack.yzz....
debian-9-mips
http://gamehack.yzz....
debian-9-mipsel
http://gamehack.yzz....
ubuntu-18.04-amd64
3http://gamehack.yzz....
ubuntu-20.04-amd64
4http://gamehack.yzz....
ubuntu-22.04-amd64
3http://gamehack.yzz....
ubuntu-24.04-amd64
6General
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
http://gamehack.yzz.me/?i=1
Resource
win11-20241007-en
Behavioral task
behavioral2
Sample
http://gamehack.yzz.me/?i=1
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
http://gamehack.yzz.me/?i=1
Resource
win10v2004-20241007-en
Behavioral task
behavioral4
Sample
http://gamehack.yzz.me/?i=1
Resource
win11-20241007-en
Behavioral task
behavioral5
Sample
http://gamehack.yzz.me/?i=1
Resource
android-33-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
http://gamehack.yzz.me/?i=1
Resource
android-x64-20240624-en
Behavioral task
behavioral7
Sample
http://gamehack.yzz.me/?i=1
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral8
Sample
http://gamehack.yzz.me/?i=1
Resource
android-33-x64-arm64-20240910-en
Behavioral task
behavioral9
Sample
http://gamehack.yzz.me/?i=1
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral10
Sample
http://gamehack.yzz.me/?i=1
Resource
macos-20240711.1-en
Behavioral task
behavioral11
Sample
http://gamehack.yzz.me/?i=1
Resource
macos-20240711.1-en
Behavioral task
behavioral12
Sample
http://gamehack.yzz.me/?i=1
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral13
Sample
http://gamehack.yzz.me/?i=1
Resource
debian12-armhf-20240221-en
Behavioral task
behavioral14
Sample
http://gamehack.yzz.me/?i=1
Resource
debian12-mipsel-20240221-en
Behavioral task
behavioral15
Sample
http://gamehack.yzz.me/?i=1
Resource
debian9-armhf-20240611-en
Behavioral task
behavioral16
Sample
http://gamehack.yzz.me/?i=1
Resource
debian9-mipsbe-20240611-en
Behavioral task
behavioral17
Sample
http://gamehack.yzz.me/?i=1
Resource
debian9-mipsel-20240611-en
Behavioral task
behavioral18
Sample
http://gamehack.yzz.me/?i=1
Resource
ubuntu1804-amd64-20240611-en
Behavioral task
behavioral19
Sample
http://gamehack.yzz.me/?i=1
Resource
ubuntu2004-amd64-20240611-en
Behavioral task
behavioral20
Sample
http://gamehack.yzz.me/?i=1
Resource
ubuntu2204-amd64-20240611-en
Behavioral task
behavioral21
Sample
http://gamehack.yzz.me/?i=1
Resource
ubuntu2404-amd64-20240523-en
Malware Config
Targets
-
-
Path Permission
Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.
-
Gatekeeper Bypass
Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.
-
File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Hide Artifacts
1Resource Forking
1Indicator Removal
1File Deletion
1Modify Registry
1Subvert Trust Controls
1Gatekeeper Bypass
1Virtualization/Sandbox Evasion
1System Checks
1