Analysis Report x03hxefIsS
Overview
General Information
Detection
OceanLotus
Score: | 96 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Antivirus / Scanner detection for submitted sample
Detected macOS OceanLotus
Yara detected OceanLotus
Denies being traced/debugged (via ptrace PT_DENY_ATTACH)
Executes the "ioreg" command used to gather hardware information (I/O kit registry)
Explicitly modifies time stamps using the "touch" command
Likely queries the I/O Kit registry to detect VMs (based on "IOPlatformExpertDevice" class)
Queries the Boot ROM version of the machine (might be used for detecting native machines, i.e. VM presence)
Queries the Manufacturer of the machine (might be used for detecting VM presence)
Queries the unique Apple serial number of the machine
Sample file contains a Mach-O with an entry point into CFstrings (probably to hamper static analysis)
Executes commands using a shell command-line interpreter
Executes the "grep" command used to find patterns in files or piped streams
Executes the "sleep" command used to delay execution and potentially evade sandboxes
Executes the "sysctl" command used to retrieve or modify kernel settings
Executes the "system_profiler" command used to collect detailed system hardware and software information
Executes the "touch" command used to create files or modify time stamps
Executes the "uname" command used to read OS and architecture name
Hides files and/or directories from GUI
Many shell processes execute programs via execve syscall (might be indicative for malicious behavior)
Queries OS software version with shell command 'sw_vers'
Reads hardware related sysctl values
Reads launchservices plist files
Reads the sysctl hardware model value (might be used for detecting VM presence)
Reads the systems OS release and/or type
Reads the systems hostname
Classification
Startup |
---|
|
Yara Overview |
---|
Memory Dumps |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_OceanLotus | Yara detected OceanLotus | Joe Security |
Signature Overview |
---|
Click to jump to signature section
Show All Signature Results
AV Detection: |
---|
Antivirus / Scanner detection for submitted sample | Show sources |
Source: | Avira: |
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: | ||
Source: | String found in binary or memory: |
Source: | Classification label: |
Persistence and Installation Behavior: |
---|
Explicitly modifies time stamps using the "touch" command | Show sources |
Source: | Touch executable uses timestamp modification options: | Jump to behavior |
Sample file contains a Mach-O with an entry point into CFstrings (probably to hamper static analysis) | Show sources |
Source: | Entry point in __cfstring: |
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior |
Source: | Grep executable: | Jump to behavior |
Source: | Sysctl executable: | Jump to behavior |
Source: | Touch executable: | Jump to behavior |
Source: | Shell process: | Jump to behavior | ||
Source: | Shell process: | Jump to behavior | ||
Source: | Shell process: | Jump to behavior | ||
Source: | Shell process: | Jump to behavior | ||
Source: | Shell process: | Jump to behavior | ||
Source: | Shell process: | Jump to behavior | ||
Source: | Shell process: | Jump to behavior | ||
Source: | Shell process: | Jump to behavior | ||
Source: | Shell process: | Jump to behavior | ||
Source: | Shell process: | Jump to behavior | ||
Source: | Shell process: | Jump to behavior | ||
Source: | Shell process: | Jump to behavior | ||
Source: | Shell process: | Jump to behavior | ||
Source: | Shell process: | Jump to behavior |
Source: | Launchservices plist file read: | Jump to behavior |
Source: | Awk executable: | Jump to behavior | ||
Source: | Awk executable: | Jump to behavior |
Hooking and other Techniques for Hiding and Protection: |
---|
Denies being traced/debugged (via ptrace PT_DENY_ATTACH) | Show sources |
Source: | PTRACE system call (PT_DENY_ATTACH): | Jump to behavior |
Source: | Hidden flag set: | Jump to behavior | ||
Source: | Hidden flag set: | Jump to behavior |
Malware Analysis System Evasion: |
---|
Likely queries the I/O Kit registry to detect VMs (based on "IOPlatformExpertDevice" class) | Show sources |
Source: | IOreg executable: | Jump to behavior |
Queries the Boot ROM version of the machine (might be used for detecting native machines, i.e. VM presence) | Show sources |
Source: | Boot ROM Version keywords found in command: | Jump to behavior | ||
Source: | Boot ROM Version keywords found in command: | Jump to behavior |
Queries the Manufacturer of the machine (might be used for detecting VM presence) | Show sources |
Source: | Manufacturer keyword found in command: | Jump to behavior | ||
Source: | Manufacturer keyword found in command: | Jump to behavior |
Source: | Sleep executable: | Jump to behavior | ||
Source: | Sleep executable: | Jump to behavior |
Source: | Sysctl read request: | Jump to behavior | ||
Source: | Sysctl read request: | Jump to behavior |
Language, Device and Operating System Detection: |
---|
Executes the "ioreg" command used to gather hardware information (I/O kit registry) | Show sources |
Source: | IOreg executable: | Jump to behavior | ||
Source: | IOreg executable: | Jump to behavior |
Queries the unique Apple serial number of the machine | Show sources |
Source: | IOPlatformSerialNumber keyword found in command: | Jump to behavior | ||
Source: | IOPlatformSerialNumber keyword found in command: | Jump to behavior |
Source: | sw_vers executed: | Jump to behavior | ||
Source: | sw_vers executed: | Jump to behavior |
Source: | Sysctl read request: | Jump to behavior | ||
Source: | Sysctl read request: | Jump to behavior |
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior |
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: |