Analysis

  • max time kernel
    82s
  • max time network
    105s
  • platform
    macos-10.15_amd64
  • resource
    macos-20241101-en
  • resource tags

    arch:amd64arch:i386image:macos-20241101-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    25-11-2024 11:19

General

  • Target

    cdautorun/Picasa CD Slideshow.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Inspector

  • Size

    120KB

  • MD5

    ce34cf0e6dba7e4e003e20bd076e4f21

  • SHA1

    60df0d3f38d36c83c13ec1d89ec142373a96538e

  • SHA256

    b046837030fe7cf858b856f2ad53c1fd8c5e65b362ffd43954a498434153e989

  • SHA512

    a669c9b5ab788371b35bd08c5a9ea344181fff4aea501d7c248c5668182f579ad523c0035a72a04d8fcbb14b0cdbd0c09e4f85f18fd9e27e36ea783a675d4060

  • SSDEEP

    1536:z5BbaTOV0iKSd2JNGfYWB7P6mzh5CWzpf/cjOVYXzLDSPD0vvpN:z5BbyOV0iKSMNU9CycIYXnD4DmBN

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 4 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/cdautorun/Picasa CD Slideshow.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Inspector\""
    1⤵
      PID:477
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/cdautorun/Picasa CD Slideshow.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Inspector\""
      1⤵
        PID:477
      • /usr/bin/sudo
        sudo /bin/zsh -c "/Users/run/cdautorun/Picasa CD Slideshow.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Inspector"
        1⤵
          PID:477
          • /bin/zsh
            /bin/zsh -c "/Users/run/cdautorun/Picasa CD Slideshow.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Inspector"
            2⤵
              PID:478
            • /Users/run/cdautorun/Picasa
              /Users/run/cdautorun/Picasa CD Slideshow.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Inspector
              2⤵
                PID:478
            • /usr/libexec/xpcproxy
              xpcproxy com.apple.sysmond
              1⤵
                PID:498
              • /usr/libexec/sysmond
                /usr/libexec/sysmond
                1⤵
                  PID:498

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads