MA Backlog

Created: 28.07.2022

Add new items here: and see also here


From ChatGPT

  1. File infectors: These viruses infect executable files and are spread when the infected file is executed. When an infected file is run, the virus code is activated and can spread to other files on the system. Examples include the Cascade virus and the Jerusalem virus.
  2. Boot sector viruses: These viruses infect the boot sector of a disk, usually a floppy disk, and are activated when the computer is booted from the infected disk. The virus then spreads to other disks that are accessed by the infected system. Examples include the Stoned virus and the Michelangelo virus.
  3. Macro viruses: These viruses infect documents that contain macro code, such as Microsoft Word or Excel documents. When the infected document is opened, the virus code is executed and can infect other documents on the system. Examples include the Melissa virus and the ILOVEYOU virus.
  4. Stealth viruses: These viruses are designed to hide their presence from antivirus software and other detection methods. They do this by intercepting system calls and modifying the results, or by hooking into the operating system and altering its behavior. Examples include the Whale virus and the Meve virus.
  5. Multipartite viruses: These viruses infect both files and boot sectors, making them harder to detect and remove. They typically spread through infected files and then infect the boot sector of the system, allowing them to survive a system reboot. Examples include the Flip virus and the Invader virus.
  6. Polymorphic viruses: These viruses use encryption or other techniques to change their code each time they infect a new system, making them difficult to detect and remove. Examples include the W95/CIH virus and the Satanbug virus
  7. Worms: While not technically viruses, worms are self-replicating malware that spread through networks or the internet. They typically exploit vulnerabilities in software or operating systems to spread, and can cause significant damage to systems and networks. Examples include the Morris worm and the WannaCry worm.


Import tables and how this works, how to do it.


Are there packers for macOS? Is there are process for restoring import table there?



Malware Unicorn - Labs to check out. The Art of Mac Malware - read and try samples on the OneEye or something. Incident response stuff -

Check out Blue Jupyter tool. Could be very useful for IR as well.

Samples Repos

Go Merlin -


πŸ”₯ - attack techniques, code samples and detection rules. πŸ”₯ - common Windows API invoked by the malware.

Malicious websites:

My own is maintained in Notion for now. Planning to turn this into a SQL DB + CLI.



GoLang Malware Palo Altro Research Programming Language Recognition & Analyzing a Go Service Backdoor video


macOS - In a report on a recent Lazarus APT Group macOS implant, I noted that the group’s capabilities continue to evolve, as evidenced in β€œa new sample with the ability to remotely download and execute payloads directly from memory,” thus thwarting various file-based security tools.”13 In β€œFinFisher Filleted,” yet another write-up on a piece of sophisticated macOS malware, I discussed the use of a kernel-level rootkit component. I noted that the rootkit β€œcontains the logic to remove the target process of interest, by unlinking it from the (process) list. Once removed, the process is now hidden.” (Patrick Wardle, “FinFisher Filleted: a triage of the FinSpy (macOS) malware,” Objective-See, September 26, 2020, and Patrick Wardle, “Lazarus Group Goes ‘Fileless’,” Objective-See, December 3,2019, a detailed report, β€œAll Your Macs Are Belong To Us,” on a vulnerability now patched as CVE-2021-30657, I wrote about how malware was exploiting this flaw to run unsigned and unnotarized code, β€œbypassing all File Quarantine, Gatekeeper, and Notarization requirements.”

macOS Malware

Add new items here: and see also here

Mami, Dacls, FinSpy, IPStorm, and GravityRAT, like Kitm, NetWire, and WindTail.


Persists both as a login item and a lauch agent (see the persistence artefacts for more information).


Launch item. Has a in the Resources/ dir.


Prefers being run as a Launch Daemon. But if it finds itself only running with user privileges, it instead creates a user launch agent.


Persists a python script as a cron job.

Wardle, Patrick. The Art of Mac Malware (p. 31). No Starch Press. Kindle Edition.


Expand… Something here