× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: b2e3300f71024be8c30ef3d18289231a066a2c17a5d88d7b2f580fe11697ba64
File name: Type32demo.dmg
Detection ratio: 0 / 57
Analysis date: 2017-07-09 02:17:33 UTC ( 4 months, 1 week ago ) View latest
Antivirus Result Update
Ad-Aware 20170709
AegisLab 20170709
AhnLab-V3 20170708
Alibaba 20170709
ALYac 20170709
Antiy-AVL 20170708
Arcabit 20170709
Avast 20170709
AVG 20170709
Avira (no cloud) 20170708
AVware 20170709
Baidu 20170707
BitDefender 20170709
Bkav 20170706
CAT-QuickHeal 20170708
ClamAV 20170708
CMC 20170707
Comodo 20170709
CrowdStrike Falcon (ML) 20170420
Cylance 20170709
Cyren 20170708
DrWeb 20170708
Emsisoft 20170708
Endgame 20170706
ESET-NOD32 20170709
F-Prot 20170709
F-Secure 20170709
Fortinet 20170629
GData 20170708
Ikarus 20170708
Sophos ML 20170607
Jiangmin 20170709
K7AntiVirus 20170707
K7GW 20170708
Kaspersky 20170708
Kingsoft 20170709
Malwarebytes 20170709
MAX 20170709
McAfee 20170708
McAfee-GW-Edition 20170708
Microsoft 20170709
eScan 20170708
NANO-Antivirus 20170709
nProtect 20170709
Palo Alto Networks (Known Signatures) 20170709
Panda 20170708
Qihoo-360 20170709
Rising 20170709
SentinelOne (Static ML) 20170516
Sophos AV 20170709
SUPERAntiSpyware 20170708
Symantec 20170708
Symantec Mobile Insight 20170707
Tencent 20170709
TheHacker 20170707
TrendMicro 20170708
TrendMicro-HouseCall 20170708
Trustlook 20170709
VBA32 20170707
VIPRE 20170708
ViRobot 20170708
Webroot 20170709
WhiteArmor 20170706
Yandex 20170707
Zillya 20170707
ZoneAlarm by Check Point 20170709
Zoner 20170709
The file being studied is an Apple Disk Image! More specifically it follows the Universal Disk Image Format, commonly found with the DMG extension.
Contained file bundles
BLKX Table
Entry Attributes
Driver Descriptor Map (DDM : 0) 0x0050
Apple (Apple_partition_map : 1) 0x0050
disk image (Apple_HFS : 2) 0x0050
(Apple_Free : 3) 0x0050
DMG XML Property List
Entry Attributes
ID:0 0x0050
DMG structural properties
DMG version
4
Data fork offset
0x0
Data fork length
8064066
Resource fork offset
0x0
Resource fork length
0
Resource fork keys
blkx, plst
Running data fork offset
0x0
XML offset
0x8064066
XML length
7432
PLST keys
resource-fork
File identification
MD5 bc96f30a2ab6aa33c8f40401feea7c83
SHA1 91cad65da7016618291cfec8666961ff634fbd5d
SHA256 b2e3300f71024be8c30ef3d18289231a066a2c17a5d88d7b2f580fe11697ba64
ssdeep
196608:I6wfN55J6/bv+fbMUXoaN1W8UPY6OPyfIsE9t1AOOAyYFnhhM:IbLsoYqN/Rv8ARM

File size 7.7 MB ( 8072010 bytes )
File type Macintosh Disk Image
Magic literal
bzip2 compressed data, block size = 100k

TrID Macintosh Disk image (BZ2 compressed) (96.3%)
bzip2 compressed archive (3.6%)
Tags
dmg

VirusTotal metadata
First submission 2017-07-09 02:17:33 UTC ( 4 months, 1 week ago )
Last submission 2017-07-09 02:17:33 UTC ( 4 months, 1 week ago )
File names Type32demo.dmg
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Created processes
DNS requests
TCP connections