× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: e5ac73e5295cce79828261d8852999307bc2f3fc4fecb1f40ea459f46dda570a
File name: Type32demo.dmg
Detection ratio: 0 / 56
Analysis date: 2017-04-10 14:53:14 UTC ( 2 months, 2 weeks ago )
Antivirus Result Update
Ad-Aware 20170410
AegisLab 20170410
AhnLab-V3 20170410
Alibaba 20170410
ALYac 20170410
Antiy-AVL 20170410
Arcabit 20170410
Avast 20170410
AVG 20170410
Avira (no cloud) 20170410
AVware 20170410
Baidu 20170410
BitDefender 20170410
Bkav 20170410
CAT-QuickHeal 20170407
ClamAV 20170410
CMC 20170410
Comodo 20170410
CrowdStrike Falcon (ML) 20170130
Cyren 20170410
DrWeb 20170410
Emsisoft 20170410
Endgame 20170407
ESET-NOD32 20170410
F-Prot 20170410
F-Secure 20170410
Fortinet 20170410
GData 20170410
Ikarus 20170410
Invincea 20170203
Jiangmin 20170410
K7AntiVirus 20170410
K7GW 20170410
Kaspersky 20170410
Kingsoft 20170410
Malwarebytes 20170410
McAfee 20170410
McAfee-GW-Edition 20170410
Microsoft 20170410
eScan 20170410
NANO-Antivirus 20170410
nProtect 20170410
Palo Alto Networks (Known Signatures) 20170410
Panda 20170410
Qihoo-360 20170410
Rising 20170410
SentinelOne (Static ML) 20170330
Sophos 20170410
SUPERAntiSpyware 20170410
Symantec 20170410
Symantec Mobile Insight 20170406
Tencent 20170410
TheHacker 20170410
TotalDefense 20170410
TrendMicro-HouseCall 20170410
Trustlook 20170410
VBA32 20170410
VIPRE 20170410
ViRobot 20170410
Webroot 20170410
WhiteArmor 20170409
Yandex 20170410
Zillya 20170407
ZoneAlarm by Check Point 20170410
Zoner 20170410
The file being studied is an Apple Disk Image! More specifically it follows the Universal Disk Image Format, commonly found with the DMG extension.
Contained file bundles
BLKX Table
Entry Attributes
Driver Descriptor Map (DDM : 0) 0x0050
Apple (Apple_partition_map : 1) 0x0050
disk image (Apple_HFS : 2) 0x0050
(Apple_Free : 3) 0x0050
DMG XML Property List
Entry Attributes
ID:0 0x0050
DMG structural properties
DMG version
4
Data fork offset
0x0
Data fork length
7839237
Resource fork offset
0x0
Resource fork length
0
Resource fork keys
blkx, plst
Running data fork offset
0x0
XML offset
0x7839237
XML length
7375
PLST keys
resource-fork
File identification
MD5 f1509fef369e51e167a8ae73e09680bb
SHA1 b345c5c615b59af5fdf7986b139ea5b13ace5e4d
SHA256 e5ac73e5295cce79828261d8852999307bc2f3fc4fecb1f40ea459f46dda570a
ssdeep
196608:tIHRMmhXgwot8eCb4rTDvOG1joqlTPViGUMvHlKPwoJYt:oMmurtyb4HLOAjjhUM/0P

File size 7.5 MB ( 7847124 bytes )
File type Macintosh Disk Image
Magic literal
bzip2 compressed data, block size = 100k

TrID Macintosh Disk image (BZ2 compressed) (96.6%)
bzip2 compressed archive (3.3%)
Tags
dmg

VirusTotal metadata
First submission 2016-12-21 06:58:10 UTC ( 6 months ago )
Last submission 2017-03-02 06:23:58 UTC ( 3 months, 3 weeks ago )
File names 949716
Type32demo.dmg
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!
Condensed report! The following is a condensed report of the behaviour of the file when executed in a controlled environment. The actions and events described were either performed by the file itself or by any other process launched by the executed file or subjected to code injection by the executed file.
Opened files
Read files
Written files
Moved files
Created processes
HTTP requests
DNS requests
TCP connections