General
-
Target
Rare
-
Size
381KB
-
Sample
240705-ldqxzsyckh
-
MD5
f01554e8a2ff41324bd3f7abc7e80d9b
-
SHA1
7759139267426e88fcb9271672c2b01908cd109e
-
SHA256
c3ab862a2693e68d4c500fd4b7dc838e686dbd94f8ab5ef4522e813da98e4e95
-
SHA512
aa1398a06f5a3b37a699160a9ebc7894ac3be15a5020a97f745c0fc8ea7441f07f8589a06a9aa2d802b740befe0c75d22a02a8c04883a798b234f046fd1b301b
-
SSDEEP
6144:wZoMh2n9dH5M2vkm0y3Cl3pId9Rs9qvZJT3CqbMrhryfQNRPaCieMjAkvCJv1Vis:GoMh2n9dH5M2vkm0y3Cl3pId9Rs9qvZA
Static task
static1
Malware Config
Targets
-
-
Target
Rare
-
Size
381KB
-
MD5
f01554e8a2ff41324bd3f7abc7e80d9b
-
SHA1
7759139267426e88fcb9271672c2b01908cd109e
-
SHA256
c3ab862a2693e68d4c500fd4b7dc838e686dbd94f8ab5ef4522e813da98e4e95
-
SHA512
aa1398a06f5a3b37a699160a9ebc7894ac3be15a5020a97f745c0fc8ea7441f07f8589a06a9aa2d802b740befe0c75d22a02a8c04883a798b234f046fd1b301b
-
SSDEEP
6144:wZoMh2n9dH5M2vkm0y3Cl3pId9Rs9qvZJT3CqbMrhryfQNRPaCieMjAkvCJv1Vis:GoMh2n9dH5M2vkm0y3Cl3pId9Rs9qvZA
-
Path Permission
Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.
-
Gatekeeper Bypass
Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.
-
Legitimate hosting services abused for malware hosting/C2
-
File Deletion
Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.
-