Resubmissions

13-01-2025 01:05

250113-bfhdhs1jej 10

10-01-2025 13:47

250110-q3vdxsxrem 10

Analysis

  • max time kernel
    356s
  • max time network
    510s
  • platform
    macos-10.15_amd64
  • resource
    macos-20241101-en
  • resource tags

    arch:amd64arch:i386image:macos-20241101-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    13-01-2025 01:05

General

  • Target

    XWorm.V7.2.zip

  • Size

    34.5MB

  • MD5

    9a678aadc9ed2e2bd69c4c3de72f9e69

  • SHA1

    742de1cae6423b50f59a9c757b016314f492f455

  • SHA256

    8a615f3ae908bbbfd33c6c019db5791372fd0bddae07681816ea43d12dd73bd9

  • SHA512

    8eb793302fa16fd155c465271288275e929cd4a63017b48925b57d73dfca889f7b36273aabbc3a08264a4eb6ea95899f61afe7a430c362d7cf22145787a70bd4

  • SSDEEP

    786432:2Aei7Z9K1koiZEj6mcaFf8G465XEDgjHOED+K6gWvPgbHGGg:eqSiFhuUJkhjHPOgbHG/

Score
4/10

Malware Config

Signatures

  • Resource Forking 1 TTPs 2 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/XWorm.V7.2.zip\""
    1⤵
      PID:462
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/XWorm.V7.2.zip\""
      1⤵
        PID:462
      • /usr/bin/sudo
        sudo /bin/zsh -c /Users/run/XWorm.V7.2.zip
        1⤵
          PID:462
          • /bin/zsh
            /bin/zsh -c /Users/run/XWorm.V7.2.zip
            2⤵
              PID:463
            • /Users/run/XWorm.V7.2.zip
              /Users/run/XWorm.V7.2.zip
              2⤵
                PID:463
            • /usr/libexec/pkreporter
              /usr/libexec/pkreporter
              1⤵
                PID:458
              • /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer
                1⤵
                  PID:452
                • /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
                  /System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd
                  1⤵
                    PID:449
                  • /System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged
                    "/System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged"
                    1⤵
                      PID:457
                    • /Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater
                      "/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater" -bgcheck
                      1⤵
                        PID:454
                      • /usr/libexec/xpcproxy
                        xpcproxy com.apple.spindump
                        1⤵
                          PID:504
                        • /usr/sbin/spindump
                          /usr/sbin/spindump
                          1⤵
                            PID:504
                          • /usr/libexec/xpcproxy
                            xpcproxy com.apple.diagnosticd
                            1⤵
                              PID:505
                            • /usr/libexec/diagnosticd
                              /usr/libexec/diagnosticd
                              1⤵
                                PID:505

                              Network

                              MITRE ATT&CK Enterprise v15

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads