× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 049db432b05055bdf0152b82cb7939982d38067da364cee2fdbed6ceb5f60cde
File name: 049db432b05055bdf0152b82cb7939982d38067da364cee2fdbed6ceb5f60cde
Detection ratio: 34 / 55
Analysis date: 2016-06-30 20:41:16 UTC ( 4 hours, 4 minutes ago )
Antivirus Result Update
ALYac MAC.OSX.Backdoor.KitM.A 20160630
AVG BackDoor.Generic_c.FGZ 20160630
AVware Trojan.OSX.Generic (v) 20160630
Ad-Aware MAC.OSX.Backdoor.KitM.A 20160630
AhnLab-V3 OSX32-Trojan/Kitm 20160630
Arcabit MAC.OSX.Backdoor.KitM.A 20160630
Avast MacOS:Kitmos-A [Spy] 20160630
BitDefender MAC.OSX.Backdoor.KitM.A 20160630
CAT-QuickHeal Backdoor.MacOSX.Kitmos.A 20160630
ClamAV Osx.Trojan.KitM-1 20160630
Comodo UnclassifiedMalware 20160630
Cyren MacOS/Kitmos.A 20160630
DrWeb Trojan.HackBack.2 20160630
ESET-NOD32 OSX/Kitm.A 20160630
Emsisoft MAC.OSX.Backdoor.KitM.A (B) 20160630
F-Prot MacOS/Kitmos.A 20160630
F-Secure Backdoor:OSX/KitM.A 20160630
GData MAC.OSX.Backdoor.KitM.A 20160630
Ikarus Backdoor.OSX.Kitm 20160630
Kaspersky Backdoor.OSX.Kitm.a 20160630
McAfee OSX/Kitmos 20160630
McAfee-GW-Edition OSX/Kitmos 20160630
eScan MAC.OSX.Backdoor.KitM.A 20160630
Microsoft Backdoor:MacOS_X/Kitmos.A 20160630
NANO-Antivirus Trojan.Mac.Kitm.bsoppq 20160630
Qihoo-360 Win32/Backdoor.c80 20160630
Sophos OSX/HackBack-B 20160630
Symantec OSX.Kitmos 20160630
Tencent Win32.Backdoor.Kitm.Wozl 20160630
TrendMicro OSX_KITMOS.A 20160630
TrendMicro-HouseCall OSX_KITMOS.A 20160630
VIPRE Trojan.OSX.Generic (v) 20160630
ViRobot Backdoor.OSX.A.Kitm.209088[h] 20160630
nProtect MAC.OSX.Backdoor.KitM.A 20160630
AegisLab 20160630
Yandex 20160630
Alibaba 20160630
Antiy-AVL 20160630
Baidu 20160630
Bkav 20160630
CMC 20160630
Fortinet 20160630
Jiangmin 20160630
K7AntiVirus 20160630
K7GW 20160630
Kingsoft 20160630
Malwarebytes 20160630
Panda 20160630
SUPERAntiSpyware 20160630
TheHacker 20160630
TotalDefense 20160630
VBA32 20160630
Yandex 20160630
Zillya 20160630
Zoner 20160630
The file being studied is a Mac OS X executable! More specifically it is a executable file Mach-O for i386 based machines.
File signature
Identifier com.util.file
Format Mach-O thin (i386)
CDHash 4953b9013d6515dc9b46dbf3881cb4115fd1ba7d
Signature size 8514
Authority Developer ID Application: Rajinder Kumar
Authority Developer ID Certification Authority
Authority Apple Root CA
Timestamp Apr 8, 2013, 9:52:49 AM
Info.plist not bound
TeamIdentifier not set
Sealed Resources none
Interesting properties
This file is signed by Apple's Root Certificate Authority.
File header
File type executable file
Magic 0xfeedface
Required architecture i386
Sub-architecture I386_ALL
Entry point 0x1e00
Load commands 23
Load commands size 3392
File segments
Shared libraries
Load commands
File identification
MD5 d43dec59fa8e6629ff46ae9e56f698d8
SHA1 a262769648b307dc9105bc3aa7dbf97bbcf35613
SHA256 049db432b05055bdf0152b82cb7939982d38067da364cee2fdbed6ceb5f60cde

File size 204.2 KB ( 209088 bytes )
File type Mach-O
Magic literal
Mach-O executable i386

TrID Mac OS X Mach-O 32bit Intel executable (100.0%)
macho signed

VirusTotal metadata
First submission 2013-05-16 17:34:44 UTC ( 3 years, 1 month ago )
Last submission 2013-05-21 12:15:25 UTC ( 3 years, 1 month ago )
File names 049db432b05055bdf0152b82cb7939982d38067da364cee2fdbed6ceb5f60cde
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes