× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: d600b6483187b52ebcc64286b9ea9af9739fab4efaac1288790e0024e26d76f8
File name: Type32demo.dmg
Detection ratio: 0 / 56
Analysis date: 2017-04-03 07:52:00 UTC ( 3 weeks, 4 days ago ) View latest
Antivirus Result Update
Ad-Aware 20170403
AegisLab 20170403
AhnLab-V3 20170403
Alibaba 20170402
ALYac 20170403
Antiy-AVL 20170403
Arcabit 20170403
Avast 20170403
AVG 20170403
Avira (no cloud) 20170403
AVware 20170330
Baidu 20170331
BitDefender 20170403
Bkav 20170402
CAT-QuickHeal 20170403
ClamAV 20170403
CMC 20170403
Comodo 20170403
CrowdStrike Falcon (ML) 20170130
Cyren 20170403
DrWeb 20170403
Emsisoft 20170403
Endgame 20170401
ESET-NOD32 20170403
F-Prot 20170403
F-Secure 20170403
Fortinet 20170403
GData 20170403
Ikarus 20170402
Invincea 20170203
Jiangmin 20170403
K7AntiVirus 20170403
K7GW 20170403
Kaspersky 20170403
Kingsoft 20170403
Malwarebytes 20170402
McAfee 20170403
McAfee-GW-Edition 20170402
Microsoft 20170402
eScan 20170403
NANO-Antivirus 20170402
nProtect 20170403
Palo Alto Networks (Known Signatures) 20170403
Panda 20170402
Qihoo-360 20170403
Rising None
SentinelOne (Static ML) 20170330
Sophos 20170403
SUPERAntiSpyware 20170403
Symantec 20170402
Symantec Mobile Insight 20170402
Tencent 20170403
TheHacker 20170403
TrendMicro 20170403
TrendMicro-HouseCall 20170403
Trustlook 20170403
VBA32 20170331
VIPRE 20170403
ViRobot 20170403
Webroot 20170403
WhiteArmor 20170327
Yandex 20170327
Zillya 20170402
ZoneAlarm by Check Point 20170403
Zoner 20170403
The file being studied is an Apple Disk Image! More specifically it follows the Universal Disk Image Format, commonly found with the DMG extension.
Contained file bundles
BLKX Table
Entry Attributes
Driver Descriptor Map (DDM : 0) 0x0050
Apple (Apple_partition_map : 1) 0x0050
disk image (Apple_HFS : 2) 0x0050
(Apple_Free : 3) 0x0050
DMG XML Property List
Entry Attributes
ID:0 0x0050
DMG structural properties
DMG version
4
Data fork offset
0x0
Data fork length
7840279
Resource fork offset
0x0
Resource fork length
0
Resource fork keys
blkx, plst
Running data fork offset
0x0
XML offset
0x7840279
XML length
7375
PLST keys
resource-fork
File identification
MD5 a45c4a01b2bf39d5384aeaa8067101c0
SHA1 0d5561bc4118fadc65f403e58560ea9e765a0f34
SHA256 d600b6483187b52ebcc64286b9ea9af9739fab4efaac1288790e0024e26d76f8
ssdeep

File size 7.5 MB ( 7848166 bytes )
File type Macintosh Disk Image
Magic literal
bzip2 compressed data, block size = 100k

TrID Macintosh Disk image (BZ2 compressed) (96.6%)
bzip2 compressed archive (3.3%)
Tags
dmg

VirusTotal metadata
First submission 2017-04-03 07:52:00 UTC ( 3 weeks, 4 days ago )
Last submission 2017-04-07 06:05:24 UTC ( 3 weeks ago )
File names 1003176
Type32demo.dmg
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Created processes
DNS requests
TCP connections