Overview
overview
10Static
static
10The-MALWAR...MZ.exe
windows7-x64
6The-MALWAR...MZ.exe
windows10-2004-x64
The-MALWAR...MZ.exe
android-9-x86
The-MALWAR...MZ.exe
android-10-x64
The-MALWAR...MZ.exe
android-11-x64
The-MALWAR...MZ.exe
macos-10.15-amd64
4The-MALWAR...re.apk
android-9-x86
The-MALWAR...or.exe
windows7-x64
The-MALWAR...or.exe
windows10-2004-x64
The-MALWAR...or.exe
android-9-x86
The-MALWAR...or.exe
android-10-x64
The-MALWAR...or.exe
android-11-x64
The-MALWAR...or.exe
macos-10.15-amd64
1The-MALWAR...te.apk
android-9-x86
The-MALWAR...te.apk
android-10-x64
The-MALWAR...te.apk
android-11-x64
The-MALWAR...en.apk
android-9-x86
The-MALWAR...en.apk
android-10-x64
The-MALWAR...en.apk
android-11-x64
The-MALWAR...4a.apk
android-9-x86
The-MALWAR...4a.apk
android-10-x64
The-MALWAR...4a.apk
android-11-x64
The-MALWAR...at.exe
windows7-x64
1The-MALWAR...at.exe
windows10-2004-x64
3The-MALWAR...at.exe
android-9-x86
The-MALWAR...at.exe
android-10-x64
The-MALWAR...at.exe
android-11-x64
The-MALWAR...at.exe
macos-10.15-amd64
1Analysis
-
max time kernel
1615s -
max time network
1647s -
platform
macos-10.15_amd64 -
resource
macos-20241101-en -
resource tags
arch:amd64arch:i386image:macos-20241101-enkernel:19b77alocale:en-usos:macos-10.15-amd64system -
submitted
14-12-2024 20:44
Static task
static1
Behavioral task
behavioral1
Sample
The-MALWARE-Repo-master/Trojan/MEMZ.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
The-MALWARE-Repo-master/Trojan/MEMZ.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
The-MALWARE-Repo-master/Trojan/MEMZ.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
The-MALWARE-Repo-master/Trojan/MEMZ.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral5
Sample
The-MALWARE-Repo-master/Trojan/MEMZ.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral6
Sample
The-MALWARE-Repo-master/Trojan/MEMZ.exe
Resource
macos-20241101-en
Behavioral task
behavioral7
Sample
The-MALWARE-Repo-master/Trojan/Mobile_Legends_Adventure.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral8
Sample
The-MALWARE-Repo-master/Trojan/MrsMajors/BossDaMajor/BossDaMajor.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
The-MALWARE-Repo-master/Trojan/MrsMajors/BossDaMajor/BossDaMajor.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral10
Sample
The-MALWARE-Repo-master/Trojan/MrsMajors/BossDaMajor/BossDaMajor.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral11
Sample
The-MALWARE-Repo-master/Trojan/MrsMajors/BossDaMajor/BossDaMajor.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral12
Sample
The-MALWARE-Repo-master/Trojan/MrsMajors/BossDaMajor/BossDaMajor.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral13
Sample
The-MALWARE-Repo-master/Trojan/MrsMajors/BossDaMajor/BossDaMajor.exe
Resource
macos-20241106-en
Behavioral task
behavioral14
Sample
The-MALWARE-Repo-master/Trojan/elite.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral15
Sample
The-MALWARE-Repo-master/Trojan/elite.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral16
Sample
The-MALWARE-Repo-master/Trojan/elite.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral17
Sample
The-MALWARE-Repo-master/Trojan/mobelejen.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral18
Sample
The-MALWARE-Repo-master/Trojan/mobelejen.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral19
Sample
The-MALWARE-Repo-master/Trojan/mobelejen.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral20
Sample
The-MALWARE-Repo-master/Trojan/vi4a.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral21
Sample
The-MALWARE-Repo-master/Trojan/vi4a.apk
Resource
android-x64-20240624-en
Behavioral task
behavioral22
Sample
The-MALWARE-Repo-master/Trojan/vi4a.apk
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral23
Sample
The-MALWARE-Repo-master/Virus/Mabezat/Mabezat.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
The-MALWARE-Repo-master/Virus/Mabezat/Mabezat.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
The-MALWARE-Repo-master/Virus/Mabezat/Mabezat.exe
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral26
Sample
The-MALWARE-Repo-master/Virus/Mabezat/Mabezat.exe
Resource
android-x64-20240624-en
Behavioral task
behavioral27
Sample
The-MALWARE-Repo-master/Virus/Mabezat/Mabezat.exe
Resource
android-x64-arm64-20240624-en
Behavioral task
behavioral28
Sample
The-MALWARE-Repo-master/Virus/Mabezat/Mabezat.exe
Resource
macos-20241106-en
General
-
Target
The-MALWARE-Repo-master/Trojan/MEMZ.exe
-
Size
14KB
-
MD5
19dbec50735b5f2a72d4199c4e184960
-
SHA1
6fed7732f7cb6f59743795b2ab154a3676f4c822
-
SHA256
a3d5715a81f2fbeb5f76c88c9c21eeee87142909716472f911ff6950c790c24d
-
SHA512
aa8a6bbb1ec516d5d5acf8be6863a4c6c5d754cee12b3d374c3a6acb393376806edc422f0ffb661c210e5b9485da88521e4a0956a4b7b08a5467cfaacd90591d
-
SSDEEP
192:sIvxdXSQeWSg9JJS/lcIEiwqZKBkDFR43xWTM3LHn8f26gyr6yfFCj3r:sMVSaSEglcIqq3agmLc+6gyWqFCj
Malware Config
Signatures
-
Resource Forking 1 TTPs 1 IoCs
Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.
ioc Process /System/Library/Frameworks/Security.framework/Versions/A/Resources/CloudKeychainProxy.bundle/Contents/MacOS/CloudKeychainProxy Process not Found
Processes
-
/bin/shsh -c "sudo /bin/zsh -c \"/Users/run/The-MALWARE-Repo-master/Trojan/MEMZ.exe\""1⤵PID:496
-
/bin/bashsh -c "sudo /bin/zsh -c \"/Users/run/The-MALWARE-Repo-master/Trojan/MEMZ.exe\""1⤵PID:496
-
/usr/bin/sudosudo /bin/zsh -c /Users/run/The-MALWARE-Repo-master/Trojan/MEMZ.exe1⤵PID:496
-
/bin/zsh/bin/zsh -c /Users/run/The-MALWARE-Repo-master/Trojan/MEMZ.exe2⤵PID:497
-
-
/Users/run/The-MALWARE-Repo-master/Trojan/MEMZ.exe/Users/run/The-MALWARE-Repo-master/Trojan/MEMZ.exe2⤵PID:497
-
-
/usr/libexec/xpcproxyxpcproxy com.apple.secinitd1⤵PID:498
-
/usr/libexec/secinitd/usr/libexec/secinitd1⤵PID:498
-
/usr/libexec/xpcproxyxpcproxy com.apple.nsurlstoraged1⤵PID:519
-
/usr/libexec/nsurlstoraged/usr/libexec/nsurlstoraged --privileged1⤵PID:519
-
/usr/libexec/xpcproxyxpcproxy com.apple.security.cloudkeychainproxy31⤵PID:528
-
/System/Library/Frameworks/Security.framework/Versions/A/Resources/CloudKeychainProxy.bundle/Contents/MacOS/CloudKeychainProxy/System/Library/Frameworks/Security.framework/Versions/A/Resources/CloudKeychainProxy.bundle/Contents/MacOS/CloudKeychainProxy1⤵PID:528
-
/usr/libexec/xpcproxyxpcproxy com.apple.AccountPolicyHelper1⤵PID:529
-
/System/Library/PrivateFrameworks/AccountPolicy.framework/XPCServices/com.apple.AccountPolicyHelper.xpc/Contents/MacOS/com.apple.AccountPolicyHelper/System/Library/PrivateFrameworks/AccountPolicy.framework/XPCServices/com.apple.AccountPolicyHelper.xpc/Contents/MacOS/com.apple.AccountPolicyHelper1⤵PID:529
-
/usr/libexec/xpcproxyxpcproxy com.apple.spindump1⤵PID:531
-
/usr/sbin/spindump/usr/sbin/spindump1⤵PID:531
-
/usr/libexec/xpcproxyxpcproxy com.apple.diagnosticd1⤵PID:532
-
/usr/libexec/diagnosticd/usr/libexec/diagnosticd1⤵PID:532
-
/usr/libexec/xpcproxyxpcproxy com.apple.newsyslog1⤵PID:534
-
/usr/sbin/newsyslog/usr/sbin/newsyslog1⤵PID:534
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
47KB
MD50e4a0d1ceb2af6f0f8d0167ce77be2d3
SHA1414ba4c1dc5fc8bf53d550e296fd6f5ad669918c
SHA256cca093bcfc65e25dd77c849866e110df72526dffbe29d76e11e29c7d888a4030
SHA5121dc5282d27c49a4b6f921ba5dfc88b8c1d32289df00dd866f9ac6669a5a8d99afeda614bffc7cf61a44375ae73e09cd52606b443b63636977c9cd2ef4fa68a20
-
Filesize
4KB
MD5d3a1859e6ec593505cc882e6def48fc8
SHA1f8e6728e3e9de477a75706faa95cead9ce13cb32
SHA2563ebafa97782204a4a1d75cfec22e15fcdeab45b65bab3b3e65508707e034a16c
SHA512ea2a749b105759ea33408186b417359deffb4a3a5ed0533cb26b459c16bb3524d67ede5c9cf0d5098921c0c0a9313fb9c2672f1e5ba48810eda548fa3209e818