Resubmissions

05/03/2025, 18:11

250305-wss11avxav 10

05/03/2025, 18:06

250305-wprzjavrz9 4

05/03/2025, 17:59

250305-wkxdfsvvfy 3

05/03/2025, 17:55

250305-whs81svvdw 3

05/03/2025, 17:45

250305-wb6wjavtev 8

05/03/2025, 17:30

250305-v3dhmat1ht 10

05/03/2025, 17:26

250305-vzwj2at1c1 3

05/03/2025, 17:07

250305-vm2khstsax 10

05/03/2025, 17:04

250305-vlb88ss1gs 3

05/03/2025, 16:25

250305-txctgasrs8 8

General

  • Target

    http://melbet.com

  • Sample

    250305-wb6wjavtev

Malware Config

Targets

    • Target

      http://melbet.com

    • Path Permission

      Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.

    • Gatekeeper Bypass

      Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.

    • File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.

MITRE ATT&CK Enterprise v15

Tasks