MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 469fd8a280e89a6edd0d704d0be4c7e0e0d8d753e314e9ce205d7006b573865f. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Kimsuky


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 469fd8a280e89a6edd0d704d0be4c7e0e0d8d753e314e9ce205d7006b573865f
SHA3-384 hash: 82361bec1538c2ea6fd5832b972d911c5c2857e7f2e1a768524808bcc0cd9ed3324d409c0d1a9087985eade328096993
SHA1 hash: 2d746dda85805c79b5f6ea376f97d9b2f547da5d
MD5 hash: 13c07ccb4117bfba9921e45c39b10339
humanhash: enemy-charlie-juliet-berlin
File name:chaotic_capybara
Download: download sample
Signature Kimsuky
File size:52'640 bytes
First seen:2025-03-24 17:00:09 UTC
Last seen:Never
File type:php macho
MIME type:application/x-mach-binary
ssdeep 48:yQOycd3x2szbprM+ctveawGOzUyJ8fyPMAPraMXrM:MzbprM+6verGOYZyHPb
TLSH T19C339A53EB0C01A5C0AC473952D74F452522F2D54BA2532B5E81D925BFCA3567E124DF
Magika macho
Reporter mauroeldritch
Tags:ContagiousInterview DevPopper Kimsuky machO VelvetChollima


Avatar
mauroeldritch
ChaoticCapybara is macOS ARM64 malware attributed to Velvet Chollima (North Korea).
Compiled in C++ with Xcode, it performs low-level system checks to fingerprint the host before payload activation.
Notable behaviours include:
- Queries System Integrity Protection (SIP) status via csrctl and undocumented sysctl calls (CTL_KERN, 143 and 145).
- Interacts with Apple’s MAC Framework via __mac_syscall, likely to enumerate security policies and sandbox status.
- Uses getenv to detect environment variables, suggesting conditional execution.
- Contains a hardcoded EOR (XOR) instruction at offset 0x8506, likely to decrypt embedded strings or configuration.
No AV detections at time of discovery.
Project name is gilly/Target, created by username "Artyom".
Filename stripped, Mach-O ARM64, unsigned.

Intelligence


File Origin
# of uploads :
1
# of downloads :
131
Origin country :
UY UY
Vendor Threat Intelligence
Verdict:
Malicious
Score:
81.4%
Tags:
infosteal
Result
Verdict:
MALICIOUS
Threat name:
MacOS.Trojan.Generic
Status:
Suspicious
First seen:
2025-03-24 17:01:13 UTC
File Type:
MachO64 Little (Exe)
AV detection:
5 of 36 (13.89%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments