General
-
Target
2024-12-23_1e096e830e4491cd79c35a0c46850f39_adload_evilquest_rekoobe
-
Size
1.8MB
-
Sample
241223-216jystrbv
-
MD5
1e096e830e4491cd79c35a0c46850f39
-
SHA1
3700d9aab3aa1ca3064ac15d822da2794da69e6c
-
SHA256
ec520e951eebf4e7193b7279c460d7aeec4d44cc463e6bf5200c86c05d793cff
-
SHA512
61f9780f6862be308373e76ad850f6c62a8572d2e8196a5e9f0c72f134c6646ed5eb60fc9c78848ed1172e5580ea6d34da177f2ed4b2b766f79405b37f794416
-
SSDEEP
6144:UtjZtjZtjvtjGtjZtjZtjZtjvtjGtjGtjZtjZtjvtjGtjZtjZtjZtjvttbSjIVg5:U33dQ333dQk33dQ333d7GGcTN
Behavioral task
behavioral1
Sample
2024-12-23_1e096e830e4491cd79c35a0c46850f39_adload_evilquest_rekoobe
Resource
macos-20241101-en
Malware Config
Targets
-
-
Target
2024-12-23_1e096e830e4491cd79c35a0c46850f39_adload_evilquest_rekoobe
-
Size
1.8MB
-
MD5
1e096e830e4491cd79c35a0c46850f39
-
SHA1
3700d9aab3aa1ca3064ac15d822da2794da69e6c
-
SHA256
ec520e951eebf4e7193b7279c460d7aeec4d44cc463e6bf5200c86c05d793cff
-
SHA512
61f9780f6862be308373e76ad850f6c62a8572d2e8196a5e9f0c72f134c6646ed5eb60fc9c78848ed1172e5580ea6d34da177f2ed4b2b766f79405b37f794416
-
SSDEEP
6144:UtjZtjZtjvtjGtjZtjZtjZtjvtjGtjGtjZtjZtjvtjGtjZtjZtjZtjvttbSjIVg5:U33dQ333dQk33dQ333d7GGcTN
Score10/10-
EvilQuest payload
-
Evilquest family
-
Compromise Client Software Binary
Adversaries may modify client software binaries to establish persistent access to systems. Client software enables users to access services provided by a server.
-
Launch Daemon
Adversaries may create or modify Launch Daemons to execute malicious payloads as part of persistence. Launch Daemons are plist files used to interact with Launchd, the service management framework used by macOS.
-