× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4230eddcc418025ef1046b26559c1531f7203dedb10da3b3414a49225f10a8ce
File name: Typelight.dmg
Detection ratio: 0 / 54
Analysis date: 2017-04-03 07:51:19 UTC ( 2 months, 3 weeks ago ) View latest
Antivirus Result Update
Ad-Aware 20170403
AegisLab 20170403
AhnLab-V3 20170403
Alibaba 20170402
ALYac 20170403
Antiy-AVL 20170403
Arcabit 20170403
Avast 20170403
AVG 20170403
Avira (no cloud) 20170403
AVware 20170330
Baidu 20170331
BitDefender 20170403
Bkav 20170402
CAT-QuickHeal 20170403
ClamAV 20170403
CMC 20170403
Comodo 20170403
CrowdStrike Falcon (ML) 20170130
Cyren 20170403
DrWeb 20170403
Endgame 20170401
ESET-NOD32 20170403
F-Prot 20170403
F-Secure 20170403
Fortinet 20170403
GData 20170403
Invincea 20170203
Jiangmin 20170403
K7AntiVirus 20170403
K7GW 20170403
Kaspersky 20170403
Kingsoft 20170403
Malwarebytes 20170402
McAfee 20170403
McAfee-GW-Edition 20170402
Microsoft 20170402
eScan 20170403
NANO-Antivirus 20170402
nProtect 20170403
Palo Alto Networks (Known Signatures) 20170403
Panda 20170402
Qihoo-360 20170403
Rising 20170403
SentinelOne (Static ML) 20170330
Sophos 20170403
SUPERAntiSpyware 20170403
Symantec 20170402
Symantec Mobile Insight 20170402
Tencent 20170403
TheHacker 20170403
TrendMicro 20170403
TrendMicro-HouseCall 20170403
Trustlook 20170403
VBA32 20170331
VIPRE 20170403
ViRobot 20170403
Webroot 20170403
WhiteArmor 20170327
Yandex 20170327
Zillya 20170402
ZoneAlarm by Check Point 20170403
Zoner 20170403
The file being studied is an Apple Disk Image! More specifically it follows the Universal Disk Image Format, commonly found with the DMG extension.
Contained file bundles
BLKX Table
Entry Attributes
Driver Descriptor Map (DDM : 0) 0x0050
Apple (Apple_partition_map : 1) 0x0050
disk image (Apple_HFS : 2) 0x0050
(Apple_Free : 3) 0x0050
DMG XML Property List
Entry Attributes
ID:0 0x0050
DMG structural properties
DMG version
4
Data fork offset
0x0
Data fork length
5527024
Resource fork offset
0x0
Resource fork length
0
Resource fork keys
blkx, plst
Running data fork offset
0x0
XML offset
0x5527024
XML length
6779
PLST keys
resource-fork
File identification
MD5 8bc1c3e2ba3f8deb21ae71805f86a0e9
SHA1 ff9c9331ddd51d790452ad4160b060b27c5bea56
SHA256 4230eddcc418025ef1046b26559c1531f7203dedb10da3b3414a49225f10a8ce
ssdeep
98304:6J4vi6eN8r6DjbtrMybnSvenMWyXTYS2KGx/Wd1M9qjjhWziDx9Ml4Lhh1Ycd:6Jzor6DKybSv6MWgn2HUdOOhWziJhr

File size 5.3 MB ( 5534315 bytes )
File type Macintosh Disk Image
Magic literal
bzip2 compressed data, block size = 100k

TrID Macintosh Disk image (BZ2 compressed) (96.3%)
bzip2 compressed archive (3.6%)
Tags
dmg

VirusTotal metadata
First submission 2017-04-03 07:51:19 UTC ( 2 months, 3 weeks ago )
Last submission 2017-04-07 05:23:10 UTC ( 2 months, 2 weeks ago )
File names Typelight.dmg
1003047
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Created processes
HTTP requests
DNS requests
TCP connections