Analysis

  • max time kernel
    368s
  • max time network
    1802s
  • platform
    macos-10.15_amd64
  • resource
    macos-20240711.1-en
  • resource tags

    arch:amd64arch:i386image:macos-20240711.1-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    01-08-2024 20:38

General

  • Target

    XClient.exe

  • Size

    80KB

  • MD5

    bfa950b37b6a4f8de71af861e677a8b4

  • SHA1

    2ee40bfbf2964d92c82256e5924169295dfdd225

  • SHA256

    07f94f8f6061ba95899914496edc5854aa810de56797d9004875276d60e21ade

  • SHA512

    235b514fac01b24edaef3aeb4209676789b6ba9264a8798cb7ae48c26d2455cdd8f254e92bbba688535acb69fd77b3c0a0a549cf97ece84c235cc74f72234e1a

  • SSDEEP

    1536:EI5NuEGJkEtydWqZQSp1eS+b59gxzhfxdl/5m6qeo//3Oy/4IK4Dax5:Eg1GhtktQGAS+b59cJ4eA/OlINDab

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 2 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/XClient.exe\""
    1⤵
      PID:476
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/XClient.exe\""
      1⤵
        PID:476
      • /usr/bin/sudo
        sudo /bin/zsh -c /Users/run/XClient.exe
        1⤵
          PID:476
          • /bin/zsh
            /bin/zsh -c /Users/run/XClient.exe
            2⤵
              PID:479
            • /Users/run/XClient.exe
              /Users/run/XClient.exe
              2⤵
                PID:479
            • /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
              /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
              1⤵
                PID:460
              • /usr/libexec/pkreporter
                /usr/libexec/pkreporter
                1⤵
                  PID:463
                • /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                  /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                  1⤵
                    PID:466
                  • /System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged
                    "/System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged"
                    1⤵
                      PID:473
                    • /Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater
                      "/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater" -bgcheck
                      1⤵
                        PID:468
                      • /usr/libexec/xpcproxy
                        xpcproxy com.apple.spindump
                        1⤵
                          PID:522
                        • /usr/sbin/spindump
                          /usr/sbin/spindump
                          1⤵
                            PID:522
                          • /usr/libexec/xpcproxy
                            xpcproxy com.apple.diagnosticd
                            1⤵
                              PID:523
                            • /usr/libexec/diagnosticd
                              /usr/libexec/diagnosticd
                              1⤵
                                PID:523

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads