2025-12-23 (TUESDAY): MACSYNC STEALER INFECTION

ASSOCIATED FILES:

REFERENCE:

NOTES:

2025-12-23 (TUESDAY): MACSYNC STEALER INFECTION

REFERENCE:

- https://www.jamf.com/blog/macsync-stealer-evolution-code-signed-swift-malware-analysis/

ASSOCIATED MALWARE:

- SHA256 hash: b591bfbab57cc69ce985fbc426002ef00826605257de0547f20ebcfecc3724c2
- File size: 31,476,506 bytes
- File name: zk-call-messenger-installer-3.9.2-lts.dmg
- Retrieved from: hxxps[:]//zkcall[.]net/api/download?fileId=350&versionId=5&os=MACOS_APPLE&section=/download
- File type: Macintosh Disk Image, lzfse encoded, lzvn compressed
- File description: Downloaded DMG image for MacSync Stealer

- SHA256 hash: 173ff5ede7c28163ceaa9440de8a02cef26295f8be06b6b0f90b0a4284471bc2
- File size: 308,576 bytes
- File name: devupdatesuite-helper
- File type: Mach-O universal binary with 2 architectures: [x86_64:Mach-O 64-bit executable x86_64]
             [arm64:Mach-O 64-bit executable arm64]
- File description: Mach-O executable for MacSync Stealer from the installer.app content extracted from the DMG file

TRAFFIC GENERATED BY THE MACH-O BINARY:

- Date/Time of the infection: 2025-12-23 03:52 UTC

- obsidiangate[.]space - HTTPS traffic (TLSv1.3)
- focusgroovy[.]com - GET /dynamic?txd=985683bd660c0c47c6be513a2d1f0a554d52d241714bb17fb18ab0d0f8cc2dc6
- focusgroovy[.]com - POST /gate

 

IMAGES


Shown above:  Downloading the initial file, a DMG image.

 


Shown above:  From the DMG image to the malicious Mach-O file.

 


Shown above:  Traffic generated by the MacSync Stealer malware.

 


Shown above:  Example of data exfiltrated through network traffic generated by the MacSync Stealer sample.

 

Click here to return to the main page.