Analysis

  • max time kernel
    85s
  • max time network
    141s
  • platform
    macos-10.15_amd64
  • resource
    macos-20241106-en
  • resource tags

    arch:amd64arch:i386image:macos-20241106-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    25-11-2024 11:19

General

  • Target

    cdautorun/Picasa Restore.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Repor

  • Size

    89KB

  • MD5

    df5a8247b6a561ecd330bcdc0644a674

  • SHA1

    ea83636bc0af94f179dd9884650131529aa3e69f

  • SHA256

    20ca80f33ec6adb69ad3f2fa721dfab4e848c3baf6ada434c040228bc2f46a6c

  • SHA512

    0503e22366ec17ff522ccb83649873e8a162aea720baa3615784c162fbc617e81d3833b35c93685eed27a750bc60bf13b1778681d076d61dfb24413ad3b5c019

  • SSDEEP

    768:f3AM5SGsUB0M+DWn7d8qze8FNJrEWniUfIkhLQPbocdHB6jbZIb4N09:fBqW7qpG/nzhLQP1vJb4W9

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 4 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/cdautorun/Picasa Restore.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Repor\""
    1⤵
      PID:480
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/cdautorun/Picasa Restore.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Repor\""
      1⤵
        PID:480
      • /usr/bin/sudo
        sudo /bin/zsh -c "/Users/run/cdautorun/Picasa Restore.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Repor"
        1⤵
          PID:480
          • /bin/zsh
            /bin/zsh -c "/Users/run/cdautorun/Picasa Restore.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Repor"
            2⤵
              PID:481
            • /Users/run/cdautorun/Picasa
              /Users/run/cdautorun/Picasa Restore.app/Contents/Frameworks/GoogleBreakpad.framework/Versions/A/Resources/Repor
              2⤵
                PID:481
            • /usr/libexec/xpcproxy
              xpcproxy com.apple.nsurlstoraged
              1⤵
                PID:511
              • /usr/libexec/nsurlstoraged
                /usr/libexec/nsurlstoraged --privileged
                1⤵
                  PID:511

                Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • /var/db/nsurlstoraged/dafsaData.bin

                  Filesize

                  54KB

                  MD5

                  64f469698e53d0c828b7f90acd306082

                  SHA1

                  bcc041b3849e1b0b4104ffeb46002207eeac54f3

                  SHA256

                  d74d0e429343f5e1b3e0b9437e048917c4343a30cff068739ea898bad8e37ffd

                  SHA512

                  a8334d1304f2fbd32cfd0ca35c289a45c450746cf3be57170cbbe87b723b1910c2e950a73c1fb82de9dc5ed623166d339a05fec3d78b861a9254dc2cb51fab5f