General

  • Target

    Rare

  • Size

    381KB

  • Sample

    240705-ldqxzsyckh

  • MD5

    f01554e8a2ff41324bd3f7abc7e80d9b

  • SHA1

    7759139267426e88fcb9271672c2b01908cd109e

  • SHA256

    c3ab862a2693e68d4c500fd4b7dc838e686dbd94f8ab5ef4522e813da98e4e95

  • SHA512

    aa1398a06f5a3b37a699160a9ebc7894ac3be15a5020a97f745c0fc8ea7441f07f8589a06a9aa2d802b740befe0c75d22a02a8c04883a798b234f046fd1b301b

  • SSDEEP

    6144:wZoMh2n9dH5M2vkm0y3Cl3pId9Rs9qvZJT3CqbMrhryfQNRPaCieMjAkvCJv1Vis:GoMh2n9dH5M2vkm0y3Cl3pId9Rs9qvZA

Malware Config

Targets

    • Target

      Rare

    • Size

      381KB

    • MD5

      f01554e8a2ff41324bd3f7abc7e80d9b

    • SHA1

      7759139267426e88fcb9271672c2b01908cd109e

    • SHA256

      c3ab862a2693e68d4c500fd4b7dc838e686dbd94f8ab5ef4522e813da98e4e95

    • SHA512

      aa1398a06f5a3b37a699160a9ebc7894ac3be15a5020a97f745c0fc8ea7441f07f8589a06a9aa2d802b740befe0c75d22a02a8c04883a798b234f046fd1b301b

    • SSDEEP

      6144:wZoMh2n9dH5M2vkm0y3Cl3pId9Rs9qvZJT3CqbMrhryfQNRPaCieMjAkvCJv1Vis:GoMh2n9dH5M2vkm0y3Cl3pId9Rs9qvZA

    Score
    8/10
    • Path Permission

      Adversaries may modify directory permissions/attributes to evade access control lists (ACLs) and access protected files.

    • Gatekeeper Bypass

      Adversaries may modify file attributes and subvert Gatekeeper functionality to evade user prompts and execute untrusted programs. Gatekeeper is a set of technologies that act as layer of Apples security model to ensure only trusted applications are executed on a host.

    • Legitimate hosting services abused for malware hosting/C2

    • File Deletion

      Adversaries may delete files left behind by the actions of their intrusion activity. Malware, tools, or other non-native files dropped or created on a system by an adversary (ex: Ingress Tool Transfer) may leave traces to indicate to what was done within a network and how. Removal of these files can occur.

MITRE ATT&CK Matrix ATT&CK v13

Defense Evasion

File and Directory Permissions Modification

1
T1222

Linux and Mac File and Directory Permissions Modification

1
T1222.002

Subvert Trust Controls

1
T1553

Gatekeeper Bypass

1
T1553.001

Indicator Removal

1
T1070

File Deletion

1
T1070.004

Hide Artifacts

1
T1564

Resource Forking

1
T1564.009

Discovery

File and Directory Discovery

1
T1083

Command and Control

Web Service

1
T1102

Tasks