× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 5da305ed63f60bfece8641cb15aeaecfd4d1a615b07361e9449ab971f02014fb
File name: com.apple.SafariBuffer
Detection ratio: 0 / 59
Analysis date: 2017-07-29 12:53:58 UTC ( 6 months, 4 weeks ago ) View latest
Antivirus Result Update
Ad-Aware 20170729
AegisLab 20170729
AhnLab-V3 20170729
Alibaba 20170728
ALYac 20170729
Antiy-AVL 20170729
Arcabit 20170729
Avast 20170729
AVG 20170729
Avira (no cloud) 20170729
AVware 20170729
Baidu 20170728
BitDefender 20170729
Bkav 20170729
CAT-QuickHeal 20170729
ClamAV 20170729
CMC 20170729
Comodo 20170729
CrowdStrike Falcon (ML) 20170710
Cylance 20170729
Cyren 20170729
DrWeb 20170729
Emsisoft 20170729
Endgame 20170721
ESET-NOD32 20170729
F-Prot 20170729
F-Secure 20170729
Fortinet 20170729
GData 20170729
Ikarus 20170729
Sophos ML 20170607
Jiangmin 20170729
K7AntiVirus 20170729
K7GW 20170729
Kaspersky 20170729
Kingsoft 20170729
Malwarebytes 20170729
MAX 20170729
McAfee 20170729
McAfee-GW-Edition 20170729
Microsoft 20170729
eScan 20170729
NANO-Antivirus 20170729
nProtect 20170729
Palo Alto Networks (Known Signatures) 20170729
Panda 20170729
Qihoo-360 20170729
Rising 20170729
SentinelOne (Static ML) 20170718
Sophos AV 20170729
SUPERAntiSpyware 20170729
Symantec 20170728
Symantec Mobile Insight 20170728
Tencent 20170729
TheHacker 20170727
TotalDefense 20170729
TrendMicro 20170729
TrendMicro-HouseCall 20170729
Trustlook 20170729
VBA32 20170728
VIPRE 20170729
ViRobot 20170729
Webroot 20170729
WhiteArmor 20170728
Yandex 20170728
Zillya 20170728
ZoneAlarm by Check Point 20170729
Zoner 20170729
The file being studied is a Mac OS X executable! More specifically it is a executable file Mach-O for x86_64 based machines.
File header
File type executable file
Magic 0xfeedfacf
Required architecture x86_64
Sub-architecture X86_64_ALL
Entry point 0xf780
Reserved 0x0
Load commands 18
Load commands size 1880
Flags BINDS_TO_WEAK
DYLDLINK
NOUNDEFS
PIE
TWOLEVEL
WEAK_DEFINES
File segments
Shared libraries
Load commands
File identification
MD5 7ef5ab995e0317d7c5280c97149f56a3
SHA1 e0c5777c6da2a4abacec6cf78d1a25ee310b4b9a
SHA256 5da305ed63f60bfece8641cb15aeaecfd4d1a615b07361e9449ab971f02014fb
ssdeep
3072:Nc2MyTOugzCODARtJj7QUv15aDQbLdxTk4VG5Trky+/STMQ+Cjk2mAT2vTrcT:x7mi1v15ZbLdh6J1vjk2ncr0

File size 143.9 KB ( 147360 bytes )
File type Mach-O
Magic literal
Mach-O 64-bit executable

TrID Mac OS X Mach-O 64bit Intel executable (100.0%)
Tags
64bits macho

VirusTotal metadata
First submission 2017-07-14 23:35:58 UTC ( 7 months, 1 week ago )
Last submission 2018-01-12 07:32:43 UTC ( 1 month, 1 week ago )
File names com.apple.SafariBuffer
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Created processes