Analysis

  • max time kernel
    185s
  • max time network
    193s
  • platform
    macos-10.15_amd64
  • resource
    macos-20240711.1-en
  • resource tags

    arch:amd64arch:i386image:macos-20240711.1-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    15-07-2024 10:51

General

  • Target

    iconik Agent/iconik Agent.app/Contents/Resources/app/.webpack/main/index.js

  • Size

    2.0MB

  • MD5

    4a82c2b82702ad81bd18a8e0efd99ad4

  • SHA1

    80dddb1d2725357546d2d183a6ba3f357a3ab7e8

  • SHA256

    3a2f61a32d9af6a550ee888a1c043861f2384c3ce5bbebbe0c9cf73d1565767b

  • SHA512

    38d5345a63db4d69a2b21f89d03a45b1951e5b87c2e81f8aae5cf1d406b9736736895d67b9545e5c35d99bfe4d1c5be76e72f8422f983286e00942f22a6fae13

  • SSDEEP

    49152:n5m6735jSUEj5iGWvYOnBqmM0wiVELL8D9fOW6Wj7Sk4RbXJp5h9V9nCj:wNOfO/7RM

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 4 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/iconik Agent/iconik Agent.app/Contents/Resources/app/.webpack/main/index.js\""
    1⤵
      PID:477
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/iconik Agent/iconik Agent.app/Contents/Resources/app/.webpack/main/index.js\""
      1⤵
        PID:477
      • /usr/bin/sudo
        sudo /bin/zsh -c "/Users/run/iconik Agent/iconik Agent.app/Contents/Resources/app/.webpack/main/index.js"
        1⤵
          PID:477
          • /bin/zsh
            /bin/zsh -c "/Users/run/iconik Agent/iconik Agent.app/Contents/Resources/app/.webpack/main/index.js"
            2⤵
              PID:478
            • /Users/run/iconik
              /Users/run/iconik Agent/iconik Agent.app/Contents/Resources/app/.webpack/main/index.js
              2⤵
                PID:478
            • /usr/libexec/xpcproxy
              xpcproxy com.apple.DiagnosticReportCleanup.plist
              1⤵
                PID:523

              Network

              MITRE ATT&CK Enterprise v15

              Replay Monitor

              Loading Replay Monitor...

              Downloads