× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: c5030830203c3bf67ef49af6908cbeb6aa234fe0346d8d9ebf85d4dd5d7482be
File name: localfile~.x64
Detection ratio: 23 / 56
Analysis date: 2017-04-17 11:01:18 UTC ( 5 days, 20 hours ago )
Antivirus Result Update
Ad-Aware MAC.OSX.Trojan.FlashBack.T 20170417
AhnLab-V3 OSX64-Trojan/Flashback 20170417
ALYac MAC.OSX.Trojan.FlashBack.T 20170417
Arcabit MAC.OSX.Trojan.FlashBack.T 20170417
AVG OSX/Flashback 20170417
Avira (no cloud) OSX/Flashback.A.70 20170417
BitDefender MAC.OSX.Trojan.FlashBack.T 20170417
CAT-QuickHeal Backdoor.MacOSX.Flashback.A 20170417
ClamAV Win.Trojan.Flashback-24 20170417
DrWeb BackDoor.Flashback.10 20170417
Emsisoft MAC.OSX.Trojan.FlashBack.T (B) 20170417
ESET-NOD32 a variant of OSX/Flashback.A 20170417
F-Secure Trojan-Downloader:OSX/Flashback.A 20170417
Ikarus Trojan-Downloader.OSX.Flashfake 20170417
Kaspersky Trojan-Downloader.OSX.Flashfake.a 20170417
eScan MAC.OSX.Trojan.FlashBack.T 20170417
NANO-Antivirus Trojan.Mac.Flashfake.bmwwrz 20170416
Qihoo-360 Win32/Trojan.3a3 20170417
Sophos OSX/Flshplyr-A 20170417
Symantec Trojan.Gen.2 20170416
Tencent Win32.Trojan-downloader.Flashfake.Llhk 20170417
Zillya Trojan.Flashback.OSX.254 20170414
ZoneAlarm by Check Point Trojan-Downloader.OSX.Flashfake.a 20170417
AegisLab 20170417
Alibaba 20170417
Antiy-AVL 20170417
Avast 20170417
AVware 20170410
Baidu 20170417
CMC 20170417
Comodo 20170417
CrowdStrike Falcon (ML) 20170130
Cyren 20170417
Endgame 20170413
F-Prot 20170417
Fortinet 20170417
GData 20170417
Invincea 20170413
Jiangmin 20170417
K7AntiVirus 20170417
K7GW 20170417
Kingsoft 20170417
Malwarebytes 20170417
McAfee 20170417
McAfee-GW-Edition 20170417
Microsoft 20170417
nProtect 20170417
Palo Alto Networks (Known Signatures) 20170417
Panda 20170417
Rising 20170417
SentinelOne (Static ML) 20170330
SUPERAntiSpyware 20170417
Symantec Mobile Insight 20170414
TheHacker 20170416
TotalDefense 20170417
TrendMicro 20170417
TrendMicro-HouseCall 20170417
Trustlook 20170417
VBA32 20170417
VIPRE 20170417
ViRobot 20170417
Webroot 20170417
WhiteArmor 20170409
Yandex 20170417
Zoner 20170417
The file being studied is a Mac OS X executable! More specifically it is a executable file Mach-O for x86_64 based machines.
File header
File type executable file
Magic 0xfeedfacf
Required architecture x86_64
Sub-architecture X86_64_ALL
Entry point 0x1000014dc
Reserved 0x0
Load commands 19
Load commands size 2544
Flags BINDS_TO_WEAK
DYLDLINK
NOUNDEFS
TWOLEVEL
File segments
Shared libraries
Load commands
Compressed bundles
File identification
MD5 3c54b107dc35a114b0445e9b5aeb5b68
SHA1 d2df0d6dcc12e23c9e018cc67fb76c4b33704ec2
SHA256 c5030830203c3bf67ef49af6908cbeb6aa234fe0346d8d9ebf85d4dd5d7482be
ssdeep
384:1CWL1b5M76YZ7lXqNCfkvBeBr2Sa//PGfb4yr398GQMu9tExTOdNQpY7kcu6nS65:1CM0NtqNCfkvyG/eT9B8GQZwCNnnSjg

File size 44.6 KB ( 45688 bytes )
File type Mach-O
Magic literal
Mach-O 64-bit executable

TrID Mac OS X Mach-O 64bit Intel executable (100.0%)
Tags
64bits macho

VirusTotal metadata
First submission 2013-04-01 17:30:11 UTC ( 4 years ago )
Last submission 2014-12-01 05:25:18 UTC ( 2 years, 4 months ago )
File names 3c54b107dc35a114b0445e9b5aeb5b68.d2df0d6dcc12e23c9e018cc67fb76c4b33704ec2
localfile~.x64
vti-rescan
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Output
Opened files
Read files
Written files
Created processes
HTTP requests
DNS requests
TCP connections