Analysis

  • max time kernel
    132s
  • max time network
    149s
  • platform
    macos-10.15_amd64
  • resource
    macos-20240410-en
  • resource tags

    arch:amd64arch:i386image:macos-20240410-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    25-04-2024 07:08

General

  • Target

    Xvirus-Tools-1.7.1/start.bat

  • Size

    22B

  • MD5

    439fcacf5dbd7675b272bf20a28ebd26

  • SHA1

    567c60f881fe536d43f69973914cfa55ba3577a4

  • SHA256

    93f20b2d08664ce038d6c18475c6a82f6304da012aa910ffc82aca3657fd0a76

  • SHA512

    b4650e771dda5e29340867f73d5f5478e28ac3d17f00ea8d99f71e6d519faedf00e00aeba0cab889984a581adcde65a20c9bcb7e6ee818f0471de0dd6bbc1262

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 1 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/Xvirus-Tools-1.7.1/start.bat\""
    1⤵
      PID:486
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/Xvirus-Tools-1.7.1/start.bat\""
      1⤵
        PID:486
      • /usr/bin/sudo
        sudo /bin/zsh -c /Users/run/Xvirus-Tools-1.7.1/start.bat
        1⤵
          PID:486
          • /bin/zsh
            /bin/zsh -c /Users/run/Xvirus-Tools-1.7.1/start.bat
            2⤵
              PID:488
            • /Users/run/Xvirus-Tools-1.7.1/start.bat
              /Users/run/Xvirus-Tools-1.7.1/start.bat
              2⤵
                PID:488
              • /bin/sh
                sh /Users/run/Xvirus-Tools-1.7.1/start.bat
                2⤵
                  PID:488
                • /bin/bash
                  sh /Users/run/Xvirus-Tools-1.7.1/start.bat
                  2⤵
                    PID:488
                    • /usr/bin/python
                      python Xvirus.py
                      3⤵
                        PID:489
                      • /System/Library/Frameworks/Python.framework/Versions/2.7/Resources/Python.app/Contents/MacOS/Python
                        /System/Library/Frameworks/Python.framework/Versions/2.7/Resources/Python.app/Contents/MacOS/Python Xvirus.py
                        3⤵
                          PID:489
                    • /usr/bin/pluginkit
                      /usr/bin/pluginkit -e ignore -i com.microsoft.OneDrive.FinderSync
                      1⤵
                        PID:503
                      • /usr/sbin/spctl
                        /usr/sbin/spctl --assess --type execute /var/folders/pq/yy2b5ptn4cz739jgclj4m1wm0000gp/T/OneDriveUpdater0BF23177/OneDrive.app
                        1⤵
                          PID:504
                        • /usr/libexec/xpcproxy
                          xpcproxy com.apple.corespotlightservice.725FD30A-6064-6C02-CC51-5DDB8891B57E
                          1⤵
                            PID:539
                          • /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                            /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                            1⤵
                              PID:539

                            Network

                            MITRE ATT&CK Matrix ATT&CK v13

                            Defense Evasion

                            Hide Artifacts

                            1
                            T1564

                            Resource Forking

                            1
                            T1564.009

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads