macOS Analysis Report Guard.py
Overview
General Information
Detection
WildPressure
Score: | 48 |
Range: | 0 - 100 |
Whitelisted: | false |
Signatures
Yara detected WildPressure
Creates 'launchd' managed services aka launch agents with bundle ID names to possibly disguise malicious intentions
Creates hidden files, links and/or directories
Creates memory-persistent launch services
Creates user-wide 'launchd' managed services aka launch agents
Executes commands using a shell command-line interpreter
Executes the "python" command used to interpret Python scripts
Executes the "uname" command used to read OS and architecture name
Explicitly lists launch services possibly for searching
Explicitly loads/starts launch services
Reads the systems OS release and/or type
Reads the systems hostname
Classification
General Information |
---|
Joe Sandbox Version: | 32.0.0 Black Diamond |
Analysis ID: | 138361 |
Start date: | 09.07.2021 |
Start time: | 14:50:17 |
Joe Sandbox Product: | Cloud |
Overall analysis duration: | 0h 7m 54s |
Hypervisor based Inspection enabled: | false |
Report type: | full |
Sample file name: | Guard.py |
Cookbook file name: | defaultmacinteractivecookbook.jbs |
Analysis system description: | Mac Mini, Mojave (Java JDK 11.0.4, Adobe Reader 2019.012.20034, Flash 32.0.0.223) |
Analysis Mode: | default |
Detection: | MAL |
Classification: | mal48.troj.macPY@0/7@0/0 |
Process Tree |
---|
|
Yara Overview |
---|
Initial Sample |
---|
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_WildPressure | Yara detected WildPressure | Joe Security |
Jbx Signature Overview |
---|
Click to jump to signature section
Show All Signature Results
Source: | TCP traffic detected without corresponding DNS query: | ||
Source: | TCP traffic detected without corresponding DNS query: |
Source: | String found in binary or memory: |
Source: | Classification label: |
Source: | Hidden Directory created: | Jump to behavior |
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior | ||
Source: | Shell command executed: | Jump to behavior |
Source: | Python executable: | Jump to behavior | ||
Source: | Python executable: | Jump to behavior |
Source: | Launch agent/daemon listed: | Jump to behavior | ||
Source: | Launch agent/daemon listed: | Jump to behavior | ||
Source: | Launch agent/daemon listed: | Jump to behavior | ||
Source: | Launch agent/daemon listed: | Jump to behavior | ||
Source: | Launch agent/daemon listed: | Jump to behavior | ||
Source: | Launch agent/daemon listed: | Jump to behavior |
Source: | Launch agent/daemon loaded: | Jump to behavior |
Source: | Random device file read: | Jump to behavior | ||
Source: | Random device file read: | Jump to behavior |
Source: | Python framework application: | Jump to behavior | ||
Source: | Python framework application: | Jump to behavior |
Source: | XML plist file created: | |||
Source: | XML plist file created: | Jump to dropped file |
Source: | Launch agent/daemon created with KeepAlive and/or RunAtLoad, file created: | Jump to behavior | ||
Source: | Launch agent/daemon created with KeepAlive and/or RunAtLoad, file created: | Jump to behavior |
Source: | Launch agent created File created: | Jump to behavior |
Source: | Launch agent created File created: | Jump to behavior |
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior |
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior | ||
Source: | Sysctl requested: | Jump to behavior |
Source: | System or server version plist file read: | Jump to behavior | ||
Source: | System or server version plist file read: | Jump to behavior |
Stealing of Sensitive Information: |
---|
Yara detected WildPressure | Show sources |
Source: | File source: |
Source: | Uname executable: | Jump to behavior | ||
Source: | Uname executable: | Jump to behavior |
Remote Access Functionality: |
---|
Yara detected WildPressure | Show sources |
Source: | File source: |
Mitre Att&ck Matrix |
---|
Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Exfiltration | Command and Control | Network Effects | Remote Service Effects | Impact |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Valid Accounts | Scripting2 | Launch Agent4 | Launch Agent4 | Masquerading1 | OS Credential Dumping | System Information Discovery31 | Remote Services | Data from Local System | Exfiltration Over Other Network Medium | Data Obfuscation | Eavesdrop on Insecure Network Communication | Remotely Track Device Without Authorization | Modify System Partition |
Default Accounts | Launchctl1 | Launch Daemon2 | Launch Daemon2 | Scripting2 | LSASS Memory | Application Window Discovery | Remote Desktop Protocol | Data from Removable Media | Exfiltration Over Bluetooth | Junk Data | Exploit SS7 to Redirect Phone Calls/SMS | Remotely Wipe Data Without Authorization | Device Lockout |
Domain Accounts | At (Linux) | Plist Modification1 | Plist Modification1 | Hidden Files and Directories1 | Security Account Manager | Query Registry | SMB/Windows Admin Shares | Data from Network Shared Drive | Automated Exfiltration | Steganography | Exploit SS7 to Track Device Location | Obtain Device Cloud Backups | Delete Device Data |
Behavior Graph |
---|
Screenshots |
---|
Thumbnails
This section contains all screenshots as thumbnails, including those not shown in the slideshow.