Analysis
-
max time kernel
353s -
max time network
530s -
platform
macos-10.15_amd64 -
resource
macos-20241101-en -
resource tags
arch:amd64arch:i386image:macos-20241101-enkernel:19b77alocale:en-usos:macos-10.15-amd64system -
submitted
06/03/2025, 18:07
Behavioral task
behavioral1
Sample
15415145.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral2
Sample
15415145.exe
Resource
win7-20241010-en
Behavioral task
behavioral3
Sample
15415145.exe
Resource
win10v2004-20250217-en
Behavioral task
behavioral4
Sample
15415145.exe
Resource
win10ltsc2021-20250217-en
Behavioral task
behavioral5
Sample
15415145.exe
Resource
win11-20250217-en
Behavioral task
behavioral6
Sample
15415145.exe
Resource
macos-20241101-en
General
-
Target
15415145.exe
-
Size
59KB
-
MD5
6c091ad6fae0fa76f44870d1a1b05cb4
-
SHA1
040f60c0ee3f4902f919025057e34ab4d11b1abd
-
SHA256
c352c942b6df33510094c7100fb9d48e36b8e1e2af40a60ccc360b58721c2390
-
SHA512
3a414f40f99e5847d9631c4ac1143c76e77db7ae42dd8c7aed2ebf1742ec73bb802d54d6cbde3b04f6b894a4cf731aa4e9dbad95166bade13f787b489d8e8d86
-
SSDEEP
1536:skyZtyUQ8sBkROLW+UzbTH3gfm2qt0OgSko7:skItfQ8sBkROUzbTQf+6OgK7
Malware Config
Signatures
-
Resource Forking 1 TTPs 2 IoCs
Adversaries may abuse resource forks to hide malicious code or executables to evade detection and bypass security applications. A resource fork provides applications a structured way to store resources such as thumbnail images, menu definitions, icons, dialog boxes, and code.
ioc Process /System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer Process not Found "/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater" -bgcheck Process not Found
Processes
-
/bin/shsh -c "sudo /bin/zsh -c \"/Users/run/15415145.exe\""1⤵PID:457
-
/bin/bashsh -c "sudo /bin/zsh -c \"/Users/run/15415145.exe\""1⤵PID:457
-
/usr/bin/sudosudo /bin/zsh -c /Users/run/15415145.exe1⤵PID:457
-
/bin/zsh/bin/zsh -c /Users/run/15415145.exe2⤵PID:459
-
-
/Users/run/15415145.exe/Users/run/15415145.exe2⤵PID:459
-
-
/System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer/System/Library/CoreServices/loginwindow.app/Contents/Resources/LWWeeklyMessageTracer1⤵PID:450
-
/System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged"/System/Library/CoreServices/Applications/Feedback Assistant.app/Contents/Library/LaunchServices/seedusaged"1⤵PID:443
-
/System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd/System/Library/PrivateFrameworks/SpeechObjects.framework/Versions/A/SpeechDataInstallerd.app/Contents/MacOS/SpeechDataInstallerd1⤵PID:445
-
/usr/libexec/pkreporter/usr/libexec/pkreporter1⤵PID:448
-
/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater"/Library/Internet Plug-Ins/JavaAppletPlugin.plugin/Contents/Resources/Java Updater.app/Contents/MacOS/Java Updater" -bgcheck1⤵PID:452
-
/usr/libexec/xpcproxyxpcproxy com.apple.nsurlstoraged1⤵PID:489
-
/usr/libexec/nsurlstoraged/usr/libexec/nsurlstoraged --privileged1⤵PID:489
-
/usr/libexec/xpcproxyxpcproxy com.apple.spindump1⤵PID:497
-
/usr/sbin/spindump/usr/sbin/spindump1⤵PID:497
-
/usr/libexec/xpcproxyxpcproxy com.apple.diagnosticd1⤵PID:498
-
/usr/libexec/diagnosticd/usr/libexec/diagnosticd1⤵PID:498
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
54KB
MD564f469698e53d0c828b7f90acd306082
SHA1bcc041b3849e1b0b4104ffeb46002207eeac54f3
SHA256d74d0e429343f5e1b3e0b9437e048917c4343a30cff068739ea898bad8e37ffd
SHA512a8334d1304f2fbd32cfd0ca35c289a45c450746cf3be57170cbbe87b723b1910c2e950a73c1fb82de9dc5ed623166d339a05fec3d78b861a9254dc2cb51fab5f