Resubmissions

14-02-2025 22:26

250214-2cxbdaznem 8

14-02-2025 22:26

250214-2clvmszndp 8

14-02-2025 22:24

250214-2bvfdsznbp 8

14-02-2025 22:24

250214-2bdgwaznap 8

14-02-2025 22:17

250214-17tnaszqdw 8

14-02-2025 01:43

250214-b5drmaylcm 8

14-02-2025 01:41

250214-b38h8ayqfs 8

14-02-2025 01:37

250214-b1s1rayqc1 4

14-02-2025 01:21

250214-bqy41sypc1 8

14-02-2025 01:19

250214-bphewayjcm 10

General

  • Target

    http://noescape.exe

  • Sample

    250211-x45dvaxrhj

Malware Config

Targets

    • Target

      http://noescape.exe

    • Path Permission

      Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.

    • Gatekeeper Bypass

      Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.

    • File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.

MITRE ATT&CK Enterprise v15

Tasks