× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 049db432b05055bdf0152b82cb7939982d38067da364cee2fdbed6ceb5f60cde
File name: 049db432b05055bdf0152b82cb7939982d38067da364cee2fdbed6ceb5f60cde
Detection ratio: 34 / 56
Analysis date: 2015-11-25 17:03:05 UTC ( 3 hours, 15 minutes ago )
Antivirus Result Update
ALYac MAC.OSX.Backdoor.KitM.A 20151125
AVG BackDoor.Generic_c.FGZ 20151125
AVware Trojan.OSX.Generic (v) 20151125
Ad-Aware MAC.OSX.Backdoor.KitM.A 20151125
AhnLab-V3 OSX32-Trojan/Kitm 20151125
Arcabit MAC.OSX.Backdoor.KitM.A 20151125
Avast MacOS:Kitmos-A [Spy] 20151125
Avira OSX/Kitm.A 20151125
BitDefender MAC.OSX.Backdoor.KitM.A 20151125
CAT-QuickHeal Backdoor.MacOSX.Kitmos.A 20151125
ClamAV OSX.Trojan.KitM-1 20151125
Comodo UnclassifiedMalware 20151125
Cyren MacOS/Kitmos.A 20151125
DrWeb Trojan.HackBack.2 20151125
ESET-NOD32 OSX/Kitm.A 20151125
Emsisoft MAC.OSX.Backdoor.KitM.A (B) 20151125
F-Prot MacOS/Kitmos.A 20151125
F-Secure Backdoor:OSX/KitM.A 20151125
GData MAC.OSX.Backdoor.KitM.A 20151125
Ikarus Backdoor.OSX.Kitm 20151125
Kaspersky Backdoor.OSX.Kitm.a 20151125
McAfee OSX/Kitmos 20151125
McAfee-GW-Edition OSX/Kitmos 20151125
MicroWorld-eScan MAC.OSX.Backdoor.KitM.A 20151125
Microsoft Backdoor:MacOS_X/Kitmos.A 20151125
NANO-Antivirus Trojan.Mac.Kitm.bsoppq 20151125
Qihoo-360 Win32/Backdoor.c80 20151125
Sophos OSX/HackBack-B 20151125
Symantec OSX.Kitmos 20151124
Tencent Win32.Backdoor.Kitm.Wozl 20151125
TrendMicro OSX_KITMOS.A 20151125
TrendMicro-HouseCall OSX_KITMOS.A 20151125
VIPRE Trojan.OSX.Generic (v) 20151125
nProtect MAC.OSX.Backdoor.KitM.A 20151125
AegisLab 20151125
Agnitum 20151124
Alibaba 20151125
Antiy-AVL 20151125
Baidu-International 20151125
Bkav 20151125
ByteHero 20151125
CMC 20151124
Fortinet 20151125
Jiangmin 20151124
K7AntiVirus 20151125
K7GW 20151125
Malwarebytes 20151125
Panda 20151125
Rising 20151124
SUPERAntiSpyware 20151125
TheHacker 20151125
TotalDefense 20151125
VBA32 20151125
ViRobot 20151125
Zillya 20151123
Zoner 20151125
The file being studied is a Mac OS X executable! More specifically it is a executable file Mach-O for i386 based machines.
File signature
Identifier com.util.file
Format Mach-O thin (i386)
CDHash 4953b9013d6515dc9b46dbf3881cb4115fd1ba7d
Signature size 8514
Authority Developer ID Application: Rajinder Kumar
Authority Developer ID Certification Authority
Authority Apple Root CA
Timestamp Apr 8, 2013, 9:52:49 AM
Info.plist not bound
TeamIdentifier not set
Sealed Resources none
Interesting properties
This file is signed by Apple's Root Certificate Authority.
File header
File type executable file
Magic 0xfeedface
Required architecture i386
Sub-architecture I386_ALL
Entry point 0x1e00
Load commands 23
Load commands size 3392
File segments
Shared libraries
Load commands
File identification
MD5 d43dec59fa8e6629ff46ae9e56f698d8
SHA1 a262769648b307dc9105bc3aa7dbf97bbcf35613
SHA256 049db432b05055bdf0152b82cb7939982d38067da364cee2fdbed6ceb5f60cde

File size 204.2 KB ( 209088 bytes )
File type Mach-O
Magic literal
Mach-O executable i386

TrID Mac OS X Mach-O 32bit Intel executable (100.0%)
macho signed

VirusTotal metadata
First submission 2013-05-16 17:34:44 UTC ( 2 years, 6 months ago )
Last submission 2013-05-21 12:15:25 UTC ( 2 years, 6 months ago )
File names 049db432b05055bdf0152b82cb7939982d38067da364cee2fdbed6ceb5f60cde
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes