Static task
static1
URLScan task
urlscan1
Behavioral task
behavioral1
Sample
https://objective-see.com/blog/blog_0x5F.html
Resource
win10v2004-20240412-en
URLScan
Powered by URLScan.io, see original Report.
Community
Engines
Overall
URLScan
Screenshots May contain NSFW images

Links
-
hxxps://objective-see[.]myshopify[.]com/
-
hxxps://taomm[.]org/
-
hxxps://objectivebythesea[.]com/
-
hxxps://1password[.]com/?utm_medium=parnter&utm_source=Objective-See&utm_campaign=gp&utm_content=sponsorship
-
hxxps://www[.]smugmug[.]com/
-
hxxps://guardianapp[.]com/
-
hxxps://www[.]securemac[.]com/
-
hxxps://apps[.]apple[.]com/us/app/iverify/id1466120520
-
hxxps://www[.]haloprivacy[.]com/
-
hxxps://objective-see[.]com/friends[.]html
-
hxxps://objective-see[.]com/malware[.]html
-
hxxps://resources[.]malwarebytes[.]com/files/2020/02/2020_State-of-Malware-Report-1[.]pdf
-
hxxps://twitter[.]com/thomasareed
-
hxxps://blog[.]malwarebytes[.]com/mac/2020/02/mac-adware-is-more-sophisticated-dangerous-than-traditional-mac-malware/
-
hxxps://www[.]virustotal[.]com/
-
hxxps://twitter[.]com/Morpheus______
-
hxxps://twitter[.]com/philofishal
-
hxxps://objective-see[.]com/products/utilities[.]html#ProcessMonitor
-
hxxps://github[.]com/objective-see/ProcessMonitor
-
hxxps://objective-see[.]com/products/utilities[.]html#FileMonitor
-
hxxps://github[.]com/objective-see/FileMonitor
-
hxxps://objective-see[.]com/products/whatsyoursign[.]html
-
hxxps://github[.]com/objective-see/WhatsYourSign
-
hxxps://objective-see[.]com/products/netiquette[.]html
-
hxxps://github[.]com/objective-see/Netiquette
-
hxxps://www[.]hopperapp[.]com/
-
hxxps://objective-see[.]com/downloads/malware/Dacls[.]zip
-
hxxps://objective-see[.]com/blog/blog_0x57[.]html
-
hxxps://blog[.]malwarebytes[.]com/threat-analysis/2020/05/new-mac-variant-of-lazarus-dacls-rat-distributed-via-trojanized-2fa-app/
-
hxxps://blog[.]netlab[.]360[.]com/dacls-the-dual-platform-rat-en/
-
hxxps://objective-see[.]com/downloads/malware/EvilQuest[.]zip
-
hxxps://twitter[.]com/dineshdina04
-
hxxps://objective-see[.]com/blog/blog_0x59[.]html
-
hxxps://objective-see[.]com/blog/blog_0x60[.]html
-
hxxps://blog[.]trendmicro[.]com/trendlabs-security-intelligence/updates-on-thiefquest-the-quickly-evolving-macos-malware/?utm_source=feedburner
-
hxxps://twitter[.]com/dineshdina04/status/1277668001538433025
-
hxxps://twitter[.]com/thomasareed?lang=en
-
hxxps://mixedinkey[.]com/
-
hxxps://mothersruin[.]com/software/SuspiciousPackage/
-
hxxps://www[.]blackhat[.]com/docs/us-15/materials/us-15-Wardle-Writing-Bad-A-Malware-For-OS-X[.]pdf
-
hxxps://twitter[.]com/dineshdina04/status/1277672052686614528
-
hxxps://labs[.]sentinelone[.]com/breaking-evilquest-reversing-a-custom-macos-ransomware-file-encryption-routine/
-
hxxps://objective-see[.]com/downloads/malware/WatchCat[.]zip
-
hxxps://twitter[.]com/sdotknight/
-
hxxps://digitasecurity[.]com/uxprotect/
-
hxxps://www[.]sentinelone[.]com/blog/four-distinct-families-of-lazarus-malware-target-apples-macos-platform/
-
hxxps://objective-see[.]com/blog/blog_0x53[.]html#osx-yort
-
hxxps://objective-see[.]com/downloads/malware/XCSSET[.]zip
-
hxxps://www[.]intego[.]com/mac-security-blog/mac-malware-exposed-xcsset-an-advanced-new-threat/
-
hxxps://documents[.]trendmicro[.]com/assets/pdf/XCSSET_Technical_Brief[.]pdf
-
hxxps://www[.]jamf[.]com/blog/osx-xcsset-subverts-developer-environments/
-
hxxps://eclecticlight[.]co/2020/08/20/the-vulnerability-in-remote-login-ssh-persists/
-
hxxps://objective-see[.]com/downloads/malware/FinSpy[.]zip
-
hxxps://twitter[.]com/botherder
-
hxxps://t[.]co/eakdBWcYbF
-
hxxps://twitter[.]com/botherder/status/1309449600110129152?ref_src=twsrc%5Etfw
-
hxxps://www[.]amnesty[.]org/en/latest/research/2020/09/german-made-finspy-spyware-found-in-egypt-and-mac-and-linux-versions-revealed/
-
hxxps://objective-see[.]com/blog/blog_0x4F[.]html
-
hxxps://reverse[.]put[.]as/2020/09/26/the-finfisher-tales-chapter-1/
-
hxxp://phrack[.]org/issues/69/7[.]html
-
hxxps://objective-see[.]com/downloads/malware/IPStorm[.]zip
-
hxxps://www[.]intego[.]com/mac-security-blog/gravityrat-and-ipstorm-mac-malware-ported-from-windows/
-
hxxps://www[.]intezer[.]com/blog/research/a-storm-is-brewing-ipstorm-now-has-linux-malware/
-
hxxps://objective-see[.]com/downloads/malware/GravityRAT[.]zip
-
hxxps://securelist[.]com/gravityrat-the-spy-returns/99097/
-
hxxps://objective-see[.]com/blog/blog_0x5B[.]html
-
hxxps://www[.]intego[.]com/mac-security-blog/new-mac-malware-reveals-google-searches-can-be-unsafe/
-
hxxps://www[.]sentinelone[.]com/blog/how-a-new-macos-malware-dropper-delivers-vindinstaller-adware/
-
hxxps://objective-see[.]com/blog/blog_0x53[.]html
-
hxxps://www[.]welivesecurity[.]com/2020/07/16/mac-cryptocurrency-trading-application-rebranded-bundled-malware/
-
hxxps://twitter[.]com/PokeCaptain
-
hxxps://objective-see[.]com/blog/blog_0x4E[.]html
-
hxxps://labs[.]sentinelone[.]com/resourceful-macos-malware-hides-in-named-fork/
-
hxxps://www[.]trendmicro[.]com/en_us/research/20/k/new-macos-backdoor-connected-to-oceanlotus-surfaces[.]html
-
hxxps://objective-see[.]com/products/blockblock[.]html
-
hxxps://objective-see[.]com/products/lulu[.]html
-
hxxps://objective-see[.]com/products/knockknock[.]html
-
hxxps://objective-see[.]com/products/ransomwhere[.]html
-
hxxps://objective-see[.]com/products[.]html
-
hxxps://www[.]patreon[.]com/bePatron?c=701171
-
hxxps://www[.]youtube[.]com/channel/UCQycc8VDhHuNkZlKSSTDHzw
-
hxxps://twitter[.]com/objective_see
-
hxxp://eepurl[.]com/bXpXeT