Analysis

  • max time kernel
    265s
  • max time network
    303s
  • platform
    macos-10.15_amd64
  • resource
    macos-20240711.1-en
  • resource tags

    arch:amd64arch:i386image:macos-20240711.1-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    15/07/2024, 10:51

General

  • Target

    iconik Agent/iconik Agent.app/Contents/Resources/IconikFCPXHelper.app/Contents/MacOS/IconikFCPXHelper

  • Size

    2.3MB

  • MD5

    f064bd3ed475b7145f1f9f38f3bbe1da

  • SHA1

    d0787c8488527153165b37a88824a98b78c0e06e

  • SHA256

    0243e4a26854f8cf73a45fda587e77e2de85b1a0d05849242b39c43ef17b209a

  • SHA512

    d2655a1f4e177e662fcc19aae693d1de3f879efce78091380d79816d5c62a4768dbd563f0a0e41c9eaaf48e5984f027d9f81477498837cbe7eeb4b96da8af0d3

  • SSDEEP

    24576:rM+KjoaTSIDDb4q4+kJUDhQdkjXNs5rIfMJND1bEHgylaT6SdOfTd:F8TSIDDbPAJUDh/XAA6NDhEJM1dOfTd

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 4 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/iconik Agent/iconik Agent.app/Contents/Resources/IconikFCPXHelper.app/Contents/MacOS/IconikFCPXHelper\""
    1⤵
      PID:484
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/iconik Agent/iconik Agent.app/Contents/Resources/IconikFCPXHelper.app/Contents/MacOS/IconikFCPXHelper\""
      1⤵
        PID:484
      • /usr/bin/sudo
        sudo /bin/zsh -c "/Users/run/iconik Agent/iconik Agent.app/Contents/Resources/IconikFCPXHelper.app/Contents/MacOS/IconikFCPXHelper"
        1⤵
          PID:484
          • /bin/zsh
            /bin/zsh -c "/Users/run/iconik Agent/iconik Agent.app/Contents/Resources/IconikFCPXHelper.app/Contents/MacOS/IconikFCPXHelper"
            2⤵
              PID:485
            • /Users/run/iconik
              /Users/run/iconik Agent/iconik Agent.app/Contents/Resources/IconikFCPXHelper.app/Contents/MacOS/IconikFCPXHelper
              2⤵
                PID:485
            • /usr/libexec/xpcproxy
              xpcproxy com.apple.corespotlightservice.725FD30A-6064-6C02-CC51-5DDB8891B57E
              1⤵
                PID:522
              • /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                1⤵
                  PID:522
                • /bin/launchctl
                  /bin/launchctl kill SIGTERM system/com.microsoft.OneDriveUpdaterDaemon
                  1⤵
                    PID:526
                  • /bin/launchctl
                    /bin/launchctl kill SIGTERM system/com.microsoft.OneDriveStandaloneUpdaterDaemon
                    1⤵
                      PID:527

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads