× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 049db432b05055bdf0152b82cb7939982d38067da364cee2fdbed6ceb5f60cde
File name: 049db432b05055bdf0152b82cb7939982d38067da364cee2fdbed6ceb5f60cde
Detection ratio: 33 / 55
Analysis date: 2016-10-20 22:33:10 UTC ( 23 hours, 27 minutes ago )
Antivirus Result Update
ALYac MAC.OSX.Backdoor.KitM.A 20161020
AVG BackDoor.Generic_c.FGZ 20161020
AVware Trojan.OSX.Generic (v) 20161020
Ad-Aware MAC.OSX.Backdoor.KitM.A 20161020
AhnLab-V3 OSX32-Trojan/Kitm 20161020
Arcabit MAC.OSX.Backdoor.KitM.A 20161020
Avast MacOS:Kitmos-A [Spy] 20161020
Avira (no cloud) OSX/Kitm.A 20161020
BitDefender MAC.OSX.Backdoor.KitM.A 20161020
CAT-QuickHeal Backdoor.MacOSX.Kitmos.A 20161020
ClamAV Osx.Trojan.KitM-1 20161020
Comodo UnclassifiedMalware 20161020
Cyren MacOS/Kitmos.A 20161020
DrWeb Trojan.HackBack.2 20161020
ESET-NOD32 OSX/Kitm.A 20161020
Emsisoft MAC.OSX.Backdoor.KitM.A (B) 20161020
F-Prot MacOS/Kitmos.A 20161020
F-Secure Backdoor:OSX/KitM.A 20161020
GData MAC.OSX.Backdoor.KitM.A 20161020
Ikarus Backdoor.OSX.Kitm 20161020
Kaspersky Backdoor.OSX.Kitm.a 20161020
McAfee OSX/Kitmos 20161020
McAfee-GW-Edition OSX/Kitmos 20161020
eScan MAC.OSX.Backdoor.KitM.A 20161020
Microsoft Backdoor:MacOS_X/Kitmos.A 20161020
NANO-Antivirus Trojan.Mac.Kitm.bsoppq 20161020
Qihoo-360 Win32/Backdoor.c80 20161020
Sophos OSX/HackBack-B 20161020
Symantec OSX.Kitmos 20161020
Tencent Win32.Backdoor.Kitm.Wozl 20161020
TrendMicro OSX_KITMOS.A 20161020
TrendMicro-HouseCall OSX_KITMOS.A 20161020
VIPRE Trojan.OSX.Generic (v) 20161020
AegisLab 20161020
Alibaba 20161020
Antiy-AVL 20161020
Baidu 20161020
Bkav 20161020
CMC 20161020
CrowdStrike Falcon (ML) 20160725
Fortinet 20161020
Invincea 20161018
Jiangmin 20161020
K7AntiVirus 20161020
K7GW 20161020
Kingsoft 20161020
Malwarebytes 20161020
Panda 20161020
Rising 20161020
SUPERAntiSpyware 20161020
TheHacker 20161020
TotalDefense 20161020
VBA32 20161020
ViRobot 20161020
Yandex 20161020
Zillya 20161020
Zoner 20161020
nProtect 20161020
The file being studied is a Mac OS X executable! More specifically it is a executable file Mach-O for i386 based machines.
File signature
Identifier com.util.file
Format Mach-O thin (i386)
CDHash 4953b9013d6515dc9b46dbf3881cb4115fd1ba7d
Signature size 8514
Authority Developer ID Application: Rajinder Kumar
Authority Developer ID Certification Authority
Authority Apple Root CA
Timestamp Apr 8, 2013, 9:52:49 AM
Info.plist not bound
TeamIdentifier not set
Sealed Resources none
Interesting properties
This file is signed by Apple's Root Certificate Authority.
File header
File type executable file
Magic 0xfeedface
Required architecture i386
Sub-architecture I386_ALL
Entry point 0x1e00
Load commands 23
Load commands size 3392
File segments
Shared libraries
Load commands
File identification
MD5 d43dec59fa8e6629ff46ae9e56f698d8
SHA1 a262769648b307dc9105bc3aa7dbf97bbcf35613
SHA256 049db432b05055bdf0152b82cb7939982d38067da364cee2fdbed6ceb5f60cde

File size 204.2 KB ( 209088 bytes )
File type Mach-O
Magic literal
Mach-O executable i386

TrID Mac OS X Mach-O 32bit Intel executable (100.0%)
macho signed

VirusTotal metadata
First submission 2013-05-16 17:34:44 UTC ( 3 years, 5 months ago )
Last submission 2013-05-21 12:15:25 UTC ( 3 years, 5 months ago )
File names 049db432b05055bdf0152b82cb7939982d38067da364cee2fdbed6ceb5f60cde
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes