MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 4d751dd363298589cb436d78cd302f9d794ae1e3670722a464884be908671a9c. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



MacSync


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 4d751dd363298589cb436d78cd302f9d794ae1e3670722a464884be908671a9c
SHA3-384 hash: 06e26a3b79c948be05e8a72206434e43ffc29ec50884756e91ede5a09eca571e1f5fcdd4e2b7f4333584f17d1d6a8217
SHA1 hash: 7af49619f362f676bff0d780c702d91fba53aa35
MD5 hash: f9e73c254d7d66e8a99daeb4462e8827
humanhash: pizza-spring-sweet-oregon
File name:Zoom
Download: download sample
Signature MacSync
File size:136'032 bytes
First seen:2025-11-17 15:29:55 UTC
Last seen:Never
File type:php macho
MIME type:application/x-mach-binary
ssdeep 768:0Dbj6tc6QUZuZgDGAX2D2PPnZgyXGMS+CAP6nxc:GQcatDGP2PPnOE3S+CRc
TLSH T11ED3E7276708044BC44D11B692F907C2A27AFF6416F0932F0148B59C5FFA7EB51AEAC7
TrID 82.2% (.DYLIB) Mac OS X Mach-O universal Dynamically linked shared Library (32500/1/5)
17.7% (.O/DYLIB/BUNDLE) Mac OS X Universal Binary (generic) (7002/2)
Magika macho
Reporter l0psec
Tags:infostealer Mach-O machO macOS MacSync

Intelligence


File Origin
# of uploads :
1
# of downloads :
93
Origin country :
US US
Vendor Threat Intelligence
Verdict:
Likely Malicious
Threat level:
  7.5/10
Confidence:
100%
Verdict:
Malicious
File Type:
macho fat
First seen:
2025-11-14T17:27:00Z UTC
Last seen:
2025-11-16T01:49:00Z UTC
Hits:
~10
Detections:
HEUR:Trojan-Downloader.OSX.Agent.az
Score:
100%
Verdict:
Malware
File Type:
Mach-O universal binary
Verdict:
Malicious
Threat:
Trojan-Downloader.OSX.Agent
Threat name:
MacOS.Trojan.Egairtigado
Status:
Malicious
First seen:
2025-11-14 22:39:36 UTC
File Type:
Binary (Archive)
Extracted files:
2
AV detection:
12 of 24 (50.00%)
Threat level:
  5/5
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments