Analysis

  • max time kernel
    103s
  • max time network
    125s
  • platform
    macos-10.15_amd64
  • resource
    macos-20240711.1-en
  • resource tags

    arch:amd64arch:i386image:macos-20240711.1-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    11-09-2024 08:10

General

  • Target

    Omni Downloader/Omni Downloader.app/Contents/Resources/DeviceBackupRestore

  • Size

    182KB

  • MD5

    63852a2f458b09e0e2758f3a7d767261

  • SHA1

    a242d440935ac6b28a83943eee96051c5c2b62c8

  • SHA256

    28aeb85ca13b2fa7fcb5c49ab7fb8c5385e33e4218067567cc397f84a41ab21d

  • SHA512

    a6db2d27e4e567b3c45785520f1f7f64816ffd1daeff101888d5808286e213383ebc698d5fa68902a472cf2b7059d51c3d34b8c9d6ad2e9de72196e6d42becbc

  • SSDEEP

    1536:kQMb6IGcmri8YxEKwVRVSQMbT6hiYMcK:kQMb6IzmriNxETSQMb2hiNc

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 4 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/Omni Downloader/Omni Downloader.app/Contents/Resources/DeviceBackupRestore\""
    1⤵
      PID:515
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/Omni Downloader/Omni Downloader.app/Contents/Resources/DeviceBackupRestore\""
      1⤵
        PID:515
      • /usr/bin/sudo
        sudo /bin/zsh -c "/Users/run/Omni Downloader/Omni Downloader.app/Contents/Resources/DeviceBackupRestore"
        1⤵
          PID:515
          • /bin/zsh
            /bin/zsh -c "/Users/run/Omni Downloader/Omni Downloader.app/Contents/Resources/DeviceBackupRestore"
            2⤵
              PID:516
            • /Users/run/Omni
              /Users/run/Omni Downloader/Omni Downloader.app/Contents/Resources/DeviceBackupRestore
              2⤵
                PID:516
            • /usr/libexec/xpcproxy
              xpcproxy com.apple.sysmond
              1⤵
                PID:517
              • /usr/libexec/sysmond
                /usr/libexec/sysmond
                1⤵
                  PID:517
                • /usr/libexec/xpcproxy
                  xpcproxy com.apple.audio.AudioComponentRegistrar
                  1⤵
                    PID:520
                  • /System/Library/Frameworks/AudioToolbox.framework/AudioComponentRegistrar
                    /System/Library/Frameworks/AudioToolbox.framework/AudioComponentRegistrar -daemon
                    1⤵
                      PID:520
                    • /usr/libexec/xpcproxy
                      xpcproxy com.apple.corespotlightservice.725FD30A-6064-6C02-CC51-5DDB8891B57E
                      1⤵
                        PID:536
                      • /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                        /System/Library/Frameworks/CoreSpotlight.framework/CoreSpotlightService
                        1⤵
                          PID:536
                        • /bin/launchctl
                          /bin/launchctl kill SIGTERM system/com.microsoft.OneDriveUpdaterDaemon
                          1⤵
                            PID:537
                          • /bin/launchctl
                            /bin/launchctl kill SIGTERM system/com.microsoft.OneDriveStandaloneUpdaterDaemon
                            1⤵
                              PID:538

                            Network

                            MITRE ATT&CK Enterprise v15

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads