The analysis workflow
When analyzing malware that is targeting Apple systems (whether it be macOS or iOS), the following workflow can be used:
- Understand the available indicators of a compromise. Is it possible that they are related to an activity that doesn’t involve the usage of malicious code?
- Once the candidate for a malicious sample is identified, start by obtaining it and any related files and performing static analysis.
- If there are multiple files available within one bundle, find out which one is supposed to be executed first. Generally, it is defined in the
Info.plist
file in theCFBundleExecutable
field. Also, check the executable that has the same name as the bundle, but without the.app
extension. - Carefully review the strings and import functions present in binary payloads, as they may offer some insight into the malware’s functionality. Pay particular attention to the import functions mentioned in the File formats and APIs section and...