General
-
Target
ConfigurationDetector.zip
-
Size
4.2MB
-
Sample
241203-1thnwawmfy
-
MD5
3c4e343282bf2dc0a20442d4f29a1a29
-
SHA1
94214e65c596dafbd090666891c2026ec1c7c9e5
-
SHA256
8dbf836097cbd346ece1fca7481a5654ce8d61c67f594d5b944d380ff553c97d
-
SHA512
49897d2d99a9bd6243f00821d9cc561c1acb32e0596d02f9f9e973f98c5345768d77c84033d50f0cd2d49e747610e885d359990f35ceeb20ea4ac5954820bed0
-
SSDEEP
98304:0ur4m+zIHbrLLVlXCr7Xgcefm0WLtNAnKOtPhOQi0htnQN+Mc:zJomHug2sXrd
Static task
static1
Malware Config
Targets
-
-
Target
ConfigurationDetector.zip
-
Size
4.2MB
-
MD5
3c4e343282bf2dc0a20442d4f29a1a29
-
SHA1
94214e65c596dafbd090666891c2026ec1c7c9e5
-
SHA256
8dbf836097cbd346ece1fca7481a5654ce8d61c67f594d5b944d380ff553c97d
-
SHA512
49897d2d99a9bd6243f00821d9cc561c1acb32e0596d02f9f9e973f98c5345768d77c84033d50f0cd2d49e747610e885d359990f35ceeb20ea4ac5954820bed0
-
SSDEEP
98304:0ur4m+zIHbrLLVlXCr7Xgcefm0WLtNAnKOtPhOQi0htnQN+Mc:zJomHug2sXrd
-
Sliver RAT v2
-
Sliver family
-
Path Permission
Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.
-
Exfiltration Over Alternative Protocol
Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel.
-
Gatekeeper Bypass
Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.
-
File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Hide Artifacts
1Resource Forking
1Indicator Removal
1File Deletion
1Subvert Trust Controls
1Gatekeeper Bypass
1