Resubmissions
09/11/2024, 16:45
241109-t9qk4aybqm 809/11/2024, 16:45
241109-t9gm7axlas 109/11/2024, 16:40
241109-t6gtsayakb 809/11/2024, 16:28
241109-tyslba1jej 809/11/2024, 16:27
241109-tykwga1jdp 109/11/2024, 00:10
241109-age44sskgs 809/11/2024, 00:04
241109-acqp2sskat 805/11/2024, 22:12
241105-14w91syphs 619/10/2024, 17:43
241019-waytjayend 118/10/2024, 01:21
241018-bqz2baxhja 6General
Static task
static1
URLScan task
urlscan1
Malware Config
Targets
-
-
Path Permission
Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.
-
Gatekeeper Bypass
Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.
-
File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.
-