Analysis

  • max time kernel
    17s
  • max time network
    23s
  • platform
    macos-10.15_amd64
  • resource
    macos-20240711.1-en
  • resource tags

    arch:amd64arch:i386image:macos-20240711.1-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    15/07/2024, 20:50

General

  • Target

    SolaraBootstrapper.exe

  • Size

    797KB

  • MD5

    36b62ba7d1b5e149a2c297f11e0417ee

  • SHA1

    ce1b828476274375e632542c4842a6b002955603

  • SHA256

    8353c5ace62fda6aba330fb3396e4aab11d7e0476f815666bd96a978724b9e0c

  • SHA512

    fddec44631e7a800abf232648bbf417969cd5cc650f32c17b0cdc12a0a2afeb9a5dbf5c1f899bd2fa496bd22307bfc8d1237c94920fceafd84f47e13a6b98b94

  • SSDEEP

    12288:n1mzgHpbzEu8AgpQojA1j855xU9pHIRxSNN:1mzgH385QojA1j855xSHI

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 2 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /usr/libexec/xpcproxy
    xpcproxy com.apple.systemstats.daily
    1⤵
      PID:482
    • /usr/libexec/xpcproxy
      xpcproxy com.oracle.java.Java-Updater
      1⤵
        PID:483
      • /usr/libexec/xpcproxy
        xpcproxy com.apple.newsyslog
        1⤵
          PID:484
        • /bin/sh
          sh -c "sudo /bin/zsh -c \"/Users/run/SolaraBootstrapper.exe\""
          1⤵
            PID:485
          • /bin/bash
            sh -c "sudo /bin/zsh -c \"/Users/run/SolaraBootstrapper.exe\""
            1⤵
              PID:485
            • /usr/bin/sudo
              sudo /bin/zsh -c /Users/run/SolaraBootstrapper.exe
              1⤵
                PID:485
                • /bin/zsh
                  /bin/zsh -c /Users/run/SolaraBootstrapper.exe
                  2⤵
                    PID:487
                  • /Users/run/SolaraBootstrapper.exe
                    /Users/run/SolaraBootstrapper.exe
                    2⤵
                      PID:487
                  • /System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged
                    "/System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged"
                    1⤵
                      PID:476
                    • /usr/libexec/pkreporter
                      /usr/libexec/pkreporter
                      1⤵
                        PID:480
                      • /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                        /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                        1⤵
                          PID:481
                        • /usr/sbin/newsyslog
                          /usr/sbin/newsyslog
                          1⤵
                            PID:484
                          • /Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater
                            "/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater" -bgcheck
                            1⤵
                              PID:483
                            • /usr/libexec/xpcproxy
                              xpcproxy com.apple.sysmond
                              1⤵
                                PID:514
                              • /usr/libexec/sysmond
                                /usr/libexec/sysmond
                                1⤵
                                  PID:514

                                Network

                                MITRE ATT&CK Enterprise v15

                                Replay Monitor

                                Loading Replay Monitor...

                                Downloads