Analysis

  • max time kernel
    66s
  • max time network
    141s
  • platform
    macos-10.15_amd64
  • resource
    macos-20241106-en
  • resource tags

    arch:amd64arch:i386image:macos-20241106-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    11-11-2024 17:13

General

  • Target

    ceксуальные фоточки.apk

  • Size

    4.3MB

  • MD5

    91eaf17f7c0bd30a940ba59bdce10f0d

  • SHA1

    dfeb11ecfeb42f1e6b5e579189d419973e2b3ac6

  • SHA256

    0fefe74d649c4a9026762b125c3a9bf9d9b81397f098897bf40e7198b22ad147

  • SHA512

    c554a391099c6ba0e22b50a5fd6e7833bfd33888fdec9913772765a1bd7682bd2eb98d114bb1a4d3139379f37c10b72b192e685b486c1ccdcfac5a494e957c76

  • SSDEEP

    98304:KQgmulr7nfBWdyVcbfAArBFOf/5SGMvvT4FPG+:0R7fBWdOcbBBFOf/0GMvvS

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 2 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/ceксуальные фоточки.apk\""
    1⤵
      PID:454
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/ceксуальные фоточки.apk\""
      1⤵
        PID:454
      • /usr/bin/sudo
        sudo /bin/zsh -c "/Users/run/ceксуальные фоточки.apk"
        1⤵
          PID:454
          • /bin/zsh
            /bin/zsh -c "/Users/run/ceксуальные фоточки.apk"
            2⤵
              PID:458
            • /Users/run/ceксуальные
              /Users/run/ceксуальные фоточки.apk
              2⤵
                PID:458
            • /usr/libexec/pkreporter
              /usr/libexec/pkreporter
              1⤵
                PID:446
              • /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                1⤵
                  PID:449
                • /System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged
                  "/System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged"
                  1⤵
                    PID:442
                  • /Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater
                    "/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater" -bgcheck
                    1⤵
                      PID:450
                    • /usr/libexec/xpcproxy
                      xpcproxy com.apple.nsurlstoraged
                      1⤵
                        PID:487
                      • /usr/libexec/nsurlstoraged
                        /usr/libexec/nsurlstoraged --privileged
                        1⤵
                          PID:487

                        Network

                        MITRE ATT&CK Enterprise v15

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • /var/db/nsurlstoraged/dafsaData.bin

                          Filesize

                          54KB

                          MD5

                          64f469698e53d0c828b7f90acd306082

                          SHA1

                          bcc041b3849e1b0b4104ffeb46002207eeac54f3

                          SHA256

                          d74d0e429343f5e1b3e0b9437e048917c4343a30cff068739ea898bad8e37ffd

                          SHA512

                          a8334d1304f2fbd32cfd0ca35c289a45c450746cf3be57170cbbe87b723b1910c2e950a73c1fb82de9dc5ed623166d339a05fec3d78b861a9254dc2cb51fab5f