Resubmissions

16-02-2025 22:14

250216-15v4cazqem 8

16-02-2025 21:47

250216-1njc8azkgn 8

16-02-2025 17:48

250216-wdm67stqdr 8

16-02-2025 17:30

250216-v3fyratnar 8

16-02-2025 17:12

250216-vq84rstkep 8

16-02-2025 02:26

250216-cwxzksxqbt 8

15-02-2025 04:47

250215-fep47avpfs 8

15-02-2025 00:27

250215-ar7bca1pgp 8

14-02-2025 22:26

250214-2cxbdaznem 8

14-02-2025 22:26

250214-2clvmszndp 8

General

  • Target

    http://noescape.exe

  • Sample

    250216-15v4cazqem

Malware Config

Targets

    • Target

      http://noescape.exe

    • Path Permission

      Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.

    • Gatekeeper Bypass

      Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.

    • File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.

MITRE ATT&CK Enterprise v15

Tasks