General
-
Target
https://drive.google.com/uc?export=download&id=1wVutybRK2Eyn6Lz3w3Dlm9T488StOlvk
-
Sample
241212-tkpbqs1neq
Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://drive.google.com/uc?export=download&id=1wVutybRK2Eyn6Lz3w3Dlm9T488StOlvk
Resource
win10v2004-20241007-es
Behavioral task
behavioral2
Sample
https://drive.google.com/uc?export=download&id=1wVutybRK2Eyn6Lz3w3Dlm9T488StOlvk
Resource
android-33-x64-arm64-20240624-es
Behavioral task
behavioral3
Sample
https://drive.google.com/uc?export=download&id=1wVutybRK2Eyn6Lz3w3Dlm9T488StOlvk
Resource
android-x86-arm-20240624-es
Malware Config
Targets
-
-
Target
https://drive.google.com/uc?export=download&id=1wVutybRK2Eyn6Lz3w3Dlm9T488StOlvk
-
Path Permission
Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.
-
Gatekeeper Bypass
Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.
-
Legitimate hosting services abused for malware hosting/C2
-
File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.
-
MITRE ATT&CK Enterprise v15
Defense Evasion
File and Directory Permissions Modification
1Linux and Mac File and Directory Permissions Modification
1Hide Artifacts
1Resource Forking
1Indicator Removal
1File Deletion
1Subvert Trust Controls
1Gatekeeper Bypass
1