Resubmissions

28/05/2025, 19:29

250528-x7e85aem2z 8

28/05/2025, 19:26

250528-x5rt5sel8w 4

28/05/2025, 19:22

250528-x3djqsel41 8

28/05/2025, 19:19

250528-x1l34askt8 4

28/05/2025, 19:11

250528-xv5m9a11dv 10

General

  • Target

    https://github.com/Da2dalus/The-MALWARE-Repo

  • Sample

    250528-x7e85aem2z

Malware Config

Targets

    • Target

      https://github.com/Da2dalus/The-MALWARE-Repo

    • Path Permission

      Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.

    • Gatekeeper Bypass

      Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.

    • File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.

MITRE ATT&CK Enterprise v16

Tasks