ASSOCIATED FILES:
REFERENCE:
NOTES:
2025-12-23 (TUESDAY): MACSYNC STEALER INFECTION
REFERENCE:
- https://www.jamf.com/blog/macsync-stealer-evolution-code-signed-swift-malware-analysis/
ASSOCIATED MALWARE:
- SHA256 hash: b591bfbab57cc69ce985fbc426002ef00826605257de0547f20ebcfecc3724c2
- File size: 31,476,506 bytes
- File name: zk-call-messenger-installer-3.9.2-lts.dmg
- Retrieved from: hxxps[:]//zkcall[.]net/api/download?fileId=350&versionId=5&os=MACOS_APPLE§ion=/download
- File type: Macintosh Disk Image, lzfse encoded, lzvn compressed
- File description: Downloaded DMG image for MacSync Stealer
- SHA256 hash: 173ff5ede7c28163ceaa9440de8a02cef26295f8be06b6b0f90b0a4284471bc2
- File size: 308,576 bytes
- File name: devupdatesuite-helper
- File type: Mach-O universal binary with 2 architectures: [x86_64:Mach-O 64-bit executable x86_64]
[arm64:Mach-O 64-bit executable arm64]
- File description: Mach-O executable for MacSync Stealer from the installer.app content extracted from the DMG file
TRAFFIC GENERATED BY THE MACH-O BINARY:
- Date/Time of the infection: 2025-12-23 03:52 UTC
- obsidiangate[.]space - HTTPS traffic (TLSv1.3)
- focusgroovy[.]com - GET /dynamic?txd=985683bd660c0c47c6be513a2d1f0a554d52d241714bb17fb18ab0d0f8cc2dc6
- focusgroovy[.]com - POST /gate

Shown above: Downloading the initial file, a DMG image.

Shown above: From the DMG image to the malicious Mach-O file.

Shown above: Traffic generated by the MacSync Stealer malware.

Shown above: Example of data exfiltrated through network traffic generated by the MacSync Stealer sample.
Click here to return to the main page.