× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 4de3bc3e80ef3e122b54a228e188de71e0fd0a49d4643e29cf5c7aaea5c318ed
File name: Parkdale.dmg
Detection ratio: 0 / 58
Analysis date: 2018-12-29 13:09:16 UTC ( 2 weeks, 3 days ago )
Antivirus Result Update
Acronis 20181227
Ad-Aware 20181229
AegisLab 20181229
AhnLab-V3 20181228
Alibaba 20180921
ALYac 20181229
Antiy-AVL 20181229
Arcabit 20181229
Avast 20181229
Avast-Mobile 20181229
AVG 20181229
Avira (no cloud) 20181229
Babable 20180918
Baidu 20181207
BitDefender 20181229
Bkav 20181227
CAT-QuickHeal 20181228
ClamAV 20181229
CMC 20181228
Comodo 20181229
CrowdStrike Falcon (ML) 20181022
Cybereason 20180225
Cylance 20181229
Cyren 20181229
DrWeb 20181229
eGambit 20181229
Emsisoft 20181229
Endgame 20181108
ESET-NOD32 20181229
F-Prot 20181229
F-Secure 20181229
Fortinet 20181229
GData 20181229
Ikarus 20181228
Sophos ML 20181128
Jiangmin 20181229
K7AntiVirus 20181229
K7GW 20181229
Kaspersky 20181229
Kingsoft 20181229
Malwarebytes 20181229
MAX 20181229
McAfee 20181229
McAfee-GW-Edition 20181229
Microsoft 20181229
eScan 20181229
NANO-Antivirus 20181229
Palo Alto Networks (Known Signatures) 20181229
Panda 20181228
Qihoo-360 20181229
Rising 20181229
SentinelOne (Static ML) 20181223
Sophos AV 20181229
SUPERAntiSpyware 20181226
Symantec 20181228
Symantec Mobile Insight 20181225
TACHYON 20181229
Tencent 20181229
TheHacker 20181225
TotalDefense 20181229
Trapmine 20181205
TrendMicro 20181229
TrendMicro-HouseCall 20181229
Trustlook 20181229
VBA32 20181229
VIPRE 20181228
ViRobot 20181228
Webroot 20181229
Yandex 20181229
Zillya 20181228
ZoneAlarm by Check Point 20181229
Zoner 20181229
The file being studied is an Apple Disk Image! More specifically it follows the Universal Disk Image Format, commonly found with the DMG extension.
BLKX Table
Entry Attributes
Protective Master Boot Record (MBR : 0) 0x0050
GPT Header (Primary GPT Header : 1) 0x0050
GPT Partition Data (Primary GPT Table : 2) 0x0050
(Apple_Free : 3) 0x0050
disk image (Apple_HFS : 4) 0x0050
(Apple_Free : 5) 0x0050
GPT Partition Data (Backup GPT Table : 6) 0x0050
GPT Header (Backup GPT Header : 7) 0x0050
DMG XML Property List
Entry Attributes
ID:0 0x0050
DMG structural properties
DMG version
4
Data fork offset
0x0
Data fork length
1044608
Resource fork offset
0x0
Resource fork length
0
Resource fork keys
blkx, plst
Running data fork offset
0x0
XML offset
0x1044608
XML length
8387
PLST keys
resource-fork
File identification
MD5 6bfb2e4349b3ee2e05727b4fead97af5
SHA1 d2b86edf36ce5ca185e8987fe218f3e323941bb9
SHA256 4de3bc3e80ef3e122b54a228e188de71e0fd0a49d4643e29cf5c7aaea5c318ed
ssdeep
24576:W0Ato1cLTsIvvrD+/Qf4g2N++5sJoUYPcdGcqO:W0A+cLoIvjDpf4g2Nt5sCPmGcq

File size 1.0 MB ( 1053507 bytes )
File type Macintosh Disk Image
Magic literal
data

TrID Macintosh Disk image (BZlib compressed) (97.6%)
ZLIB compressed data (var. 4) (2.3%)
Tags
dmg

VirusTotal metadata
First submission 2018-10-14 18:43:49 UTC ( 3 months ago )
Last submission 2018-10-14 18:43:49 UTC ( 3 months ago )
File names Parkdale.dmg
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Created processes
HTTP requests
TCP connections