Analysis

  • max time kernel
    79s
  • max time network
    164s
  • platform
    macos-10.15_amd64
  • resource
    macos-20240214-en
  • resource tags

    arch:amd64arch:i386image:macos-20240214-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    03-04-2024 06:39

General

  • Target

    SyncBird Pro 4.0.8/Activator.app/Contents/Resources/tool

  • Size

    169KB

  • MD5

    948c1bdc9edf3e57758b677a0a449f34

  • SHA1

    a3b9ea16b0d44e835d6458db44c018349f1cff3f

  • SHA256

    4b1b8050588ad791c314ba18ba0a6b82a5b77ff8f188de7d51e13ea981ff5860

  • SHA512

    a61f433c66c4a9bd8cbe906d4bfef799ec3e5d7a9f14fa00ca65fe8053842e9530369250bb32d42182a24f89dd3689191915da79b7722e2e67c08bb3283127c0

  • SSDEEP

    768:DF8oMgvx15ne8DpC4owYEiIXIEQbadpdCukl19F7vWp:J5e8VC0JdCukC

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 4 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/SyncBird Pro 4.0.8/Activator.app/Contents/Resources/tool\""
    1⤵
      PID:571
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/SyncBird Pro 4.0.8/Activator.app/Contents/Resources/tool\""
      1⤵
        PID:571
      • /usr/bin/sudo
        sudo /bin/zsh -c "/Users/run/SyncBird Pro 4.0.8/Activator.app/Contents/Resources/tool"
        1⤵
          PID:571
          • /bin/zsh
            /bin/zsh -c "/Users/run/SyncBird Pro 4.0.8/Activator.app/Contents/Resources/tool"
            2⤵
              PID:572
            • /Users/run/SyncBird
              /Users/run/SyncBird Pro 4.0.8/Activator.app/Contents/Resources/tool
              2⤵
                PID:572
            • /usr/libexec/secinitd
              /usr/libexec/secinitd
              1⤵
                PID:570
              • /usr/libexec/xpcproxy
                xpcproxy com.apple.sysmond
                1⤵
                  PID:573
                • /usr/libexec/sysmond
                  /usr/libexec/sysmond
                  1⤵
                    PID:573
                  • /usr/libexec/xpcproxy
                    xpcproxy com.apple.icloud.findmydeviced
                    1⤵
                      PID:588
                    • /usr/libexec/findmydeviced
                      /usr/libexec/findmydeviced
                      1⤵
                        PID:588
                      • /usr/libexec/xpcproxy
                        xpcproxy com.apple.pbs
                        1⤵
                          PID:591
                        • /System/Library/CoreServices/pbs
                          /System/Library/CoreServices/pbs
                          1⤵
                            PID:591
                          • /usr/bin/pluginkit
                            /usr/bin/pluginkit -e ignore -i com.microsoft.OneDrive.FinderSync
                            1⤵
                              PID:608
                            • /usr/sbin/spctl
                              /usr/sbin/spctl --assess --type execute /var/folders/pq/yy2b5ptn4cz739jgclj4m1wm0000gp/T/OneDriveUpdater6BDB2703/OneDrive.app
                              1⤵
                                PID:609
                              • /usr/libexec/xpcproxy
                                xpcproxy com.apple.tailspind
                                1⤵
                                  PID:618
                                • /usr/libexec/tailspind
                                  /usr/libexec/tailspind
                                  1⤵
                                    PID:618

                                  Network

                                  MITRE ATT&CK Matrix ATT&CK v13

                                  Defense Evasion

                                  Hide Artifacts

                                  1
                                  T1564

                                  Resource Forking

                                  1
                                  T1564.009

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • /var/folders/pq/yy2b5ptn4cz739jgclj4m1wm0000gp/C//mds/mdsDirectory.db
                                    Filesize

                                    47KB

                                    MD5

                                    0e4a0d1ceb2af6f0f8d0167ce77be2d3

                                    SHA1

                                    414ba4c1dc5fc8bf53d550e296fd6f5ad669918c

                                    SHA256

                                    cca093bcfc65e25dd77c849866e110df72526dffbe29d76e11e29c7d888a4030

                                    SHA512

                                    1dc5282d27c49a4b6f921ba5dfc88b8c1d32289df00dd866f9ac6669a5a8d99afeda614bffc7cf61a44375ae73e09cd52606b443b63636977c9cd2ef4fa68a20

                                  • /var/folders/pq/yy2b5ptn4cz739jgclj4m1wm0000gp/C//mds/mdsObject.db
                                    Filesize

                                    4KB

                                    MD5

                                    d3a1859e6ec593505cc882e6def48fc8

                                    SHA1

                                    f8e6728e3e9de477a75706faa95cead9ce13cb32

                                    SHA256

                                    3ebafa97782204a4a1d75cfec22e15fcdeab45b65bab3b3e65508707e034a16c

                                    SHA512

                                    ea2a749b105759ea33408186b417359deffb4a3a5ed0533cb26b459c16bb3524d67ede5c9cf0d5098921c0c0a9313fb9c2672f1e5ba48810eda548fa3209e818