× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d33560fd760bb1dad9988f7e1e5c7fa19b5d4dbbc2f585125f0d4d788a8f7f85
File name: ApplicationManager
Detection ratio: 23 / 57
Analysis date: 2017-04-17 11:22:51 UTC ( 2 years ago )
Antivirus Result Update
Ad-Aware Adware.MAC.Spigot.D 20170417
ALYac Adware.MAC.Spigot.D 20170417
Arcabit Adware.MAC.Spigot.D 20170417
Avast Other:Malware-gen [Trj] 20170417
AVG OSX/Spigot.D 20170417
Avira (no cloud) ADWARE/OSX.Spigot.vtay 20170417
BitDefender Adware.MAC.Spigot.D 20170417
ClamAV Osx.Malware.Agent-1665484 20170417
DrWeb Adware.Mac.Spigot.35 20170417
Emsisoft Adware.MAC.Spigot.D (B) 20170417
ESET-NOD32 a variant of OSX/Adware.Spigot.F 20170417
F-Secure Adware.MAC.Spigot 20170417
GData Adware.MAC.Spigot.D 20170417
Kaspersky not-a-virus:HEUR:RiskTool.OSX.Spigot.a 20170417
McAfee-GW-Edition RDN/Generic.osx 20170417
eScan Adware.MAC.Spigot.D 20170417
NANO-Antivirus Riskware.Mac.MLW.eftrtn 20170416
Qihoo-360 Win32/Virus.Adware.c49 20170417
Sophos AV SpiGot (PUA) 20170417
Symantec OSX.Trojan.Gen 20170416
Tencent Win32.Adware.Spigot.Wlpm 20170417
Zillya Adware.Spigot.OSX.51 20170414
ZoneAlarm by Check Point not-a-virus:HEUR:RiskTool.OSX.Spigot.a 20170417
AegisLab 20170417
AhnLab-V3 20170417
Alibaba 20170417
Antiy-AVL 20170417
AVware 20170410
Baidu 20170417
Bkav 20170415
CAT-QuickHeal 20170417
CMC 20170417
Comodo 20170417
CrowdStrike Falcon (ML) 20170130
Cyren 20170417
Endgame 20170413
F-Prot 20170417
Fortinet 20170417
Ikarus 20170417
Sophos ML 20170413
Jiangmin 20170417
K7AntiVirus 20170417
K7GW 20170417
Kingsoft 20170417
Malwarebytes 20170417
McAfee 20170417
Microsoft 20170417
nProtect 20170417
Palo Alto Networks (Known Signatures) 20170417
Panda 20170417
Rising 20170417
SentinelOne (Static ML) 20170330
SUPERAntiSpyware 20170417
Symantec Mobile Insight 20170414
TheHacker 20170416
TotalDefense 20170417
TrendMicro 20170417
TrendMicro-HouseCall 20170417
Trustlook 20170417
VBA32 20170417
VIPRE 20170417
ViRobot 20170417
Webroot 20170417
WhiteArmor 20170409
Yandex 20170417
Zoner 20170417
The file being studied is a Mac OS X executable! More specifically it is a executable file Mach-O for x86_64 based machines.
File header
File type executable file
Magic 0xfeedfacf
Required architecture x86_64
Sub-architecture X86_64_ALL
Entry point 0x100001a40
Reserved 0x0
Load commands 31
Load commands size 4760
Flags DYLDLINK
NOUNDEFS
TWOLEVEL
File segments
Shared libraries
Load commands
Compressed bundles
File identification
MD5 632e4213f00a23820ce4e0606abd1873
SHA1 da01889fe94eda005ccc195979fb8b9f5c3fbaff
SHA256 d33560fd760bb1dad9988f7e1e5c7fa19b5d4dbbc2f585125f0d4d788a8f7f85
ssdeep
12288:w/zNZrTCPg7EB+BbyrQVwRS17AGLRlnIwM7QZs4SOF:w5ZoBGbZVww17AGLRl2aVPF

File size 766.5 KB ( 784932 bytes )
File type Mach-O
Magic literal
Mach-O 64-bit executable

TrID Mac OS X Mach-O 64bit Intel executable (100.0%)
Tags
64bits macho

VirusTotal metadata
First submission 2016-08-25 05:01:01 UTC ( 2 years, 8 months ago )
Last submission 2016-11-07 09:53:21 UTC ( 2 years, 5 months ago )
File names ApplicationManager
ApplicationManager
ApplicationManager
ApplicationManager
ApplicationManager
ApplicationManager
ApplicationManager
ApplicationManager
ApplicationManager
ApplicationManager
ApplicationManager
ApplicationManager
ApplicationManager
ApplicationManager
ApplicationManager
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Created processes
HTTP requests
DNS requests
TCP connections