Skip to main content
U.S. Department of Energy
Office of Scientific and Technical Information

Sandbox for Mac Malware v 1.0

Software ·
OSTI ID:1331316

This software is an analyzer for automated sandbox analysis of malware on the OS X operating system. It runs inside an OS X virtual machine to collect data about what happens when a given file is opened or run. As of August 2014, there was no sandbox software for Mac OS X malware, as it requires different methods from those used on the Windows OS (which most sandboxes are written for). This software adds OS X analysis capabilities to an existing open-source sandbox, Cuckoo Sandbox (http://cuckoosandbox.org/), which previously only worked for Windows. The analyzer itself can take many different types of files as input: the traditional Mach-O and FAT executables, .app files, zip files, Python scripts, Java archives, and web pages, as well as PDFs and other documents. While the file is running, the analyzer also simulates rudimentary human interaction with clicks and mouse movements in order to bypass the tests some malware use to see if they are being analyzed. The analyzer outputs several different kinds of data: function call traces, network captures, screenshots, and all created and modified files. This work also includes a static analysis Cuckoo module for Mach-O binary files. It extracts file structures, code library imports and exports, and signatures. This data can be used along with the analyzer results to create signatures for malware.

Short Name / Acronym:
KWICTITLE; 005018WKSTN00
Site Accession Number:
SCR #2005
Version:
00
Programming Language(s):
Medium: X; OS: OS X from Leopard (10.5) ti Yosemite (10.10)
Research Organization:
Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)
Sponsoring Organization:
USDOE
DOE Contract Number:
AC04-94AL85000
OSTI ID:
1331316
Country of Origin:
United States

Similar Records

Automated Behavior Analysis of Malware: A Case Study of WannaCry Ransomware
Conference · Sun Dec 31 23:00:00 EST 2017 · OSTI ID:1423027

Deep PDF parsing to extract features for detecting embedded malware.
Technical Report · Thu Sep 01 00:00:00 EDT 2011 · OSTI ID:1030303

Establishing Malware Attribution and Binary Provenance Using Multicompilation Techniques
Technical Report · Fri Jul 28 00:00:00 EDT 2017 · OSTI ID:1390004

Related Subjects