Resubmissions

31-10-2024 21:25

241031-z95b5stgkk 10

31-10-2024 21:13

241031-z29a5atfmr 10

Analysis

  • max time kernel
    45s
  • max time network
    77s
  • platform
    macos-10.15_amd64
  • resource
    macos-20240711.1-en
  • resource tags

    arch:amd64arch:i386image:macos-20240711.1-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    31-10-2024 21:25

General

  • Target

    discord_token_grabber.pyc

  • Size

    15KB

  • MD5

    aaaeca514d98795f954c1f2eebb18881

  • SHA1

    6331352aada5256452c43545bb6593958602a20c

  • SHA256

    a808291bd70bbd15bedd818ef25a1dbcfbf548330fd9ddf5244143ec3eb66cc6

  • SHA512

    ec9c019d0061103e1e1b3db7feb346136e5e4f447804f9586aacdd7da3c9b877bda1221735b08fc44586cd443b8909664a22bb90ce3a4230402357d35fe80883

  • SSDEEP

    384:nGC7RYmnXavkLPJrltcshntQ5Maa2holHVg:nGCuvkL9ltcsttQ5MaaCgHVg

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 2 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/discord_token_grabber.pyc\""
    1⤵
      PID:486
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/discord_token_grabber.pyc\""
      1⤵
        PID:486
      • /usr/bin/sudo
        sudo /bin/zsh -c /Users/run/discord_token_grabber.pyc
        1⤵
          PID:486
          • /bin/zsh
            /bin/zsh -c /Users/run/discord_token_grabber.pyc
            2⤵
              PID:489
            • /Users/run/discord_token_grabber.pyc
              /Users/run/discord_token_grabber.pyc
              2⤵
                PID:489
            • /System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged
              "/System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged"
              1⤵
                PID:471
              • /usr/libexec/pkreporter
                /usr/libexec/pkreporter
                1⤵
                  PID:474
                • /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
                  /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
                  1⤵
                    PID:473
                  • /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                    /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                    1⤵
                      PID:475
                    • /Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater
                      "/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater" -bgcheck
                      1⤵
                        PID:476
                      • /usr/libexec/xpcproxy
                        xpcproxy com.apple.audio.AudioComponentRegistrar
                        1⤵
                          PID:514
                        • /System/Library/Frameworks/AudioToolbox.framework/AudioComponentRegistrar
                          /System/Library/Frameworks/AudioToolbox.framework/AudioComponentRegistrar -daemon
                          1⤵
                            PID:514

                          Network

                          MITRE ATT&CK Enterprise v15

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads