Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

VirusTotal Adds Sandbox Execution for OS X Files

Google-owned malware scanning service VirusTotal announced on Tuesday that Mac OS X files scanned by users will be executed in a sandbox in order to analyze their behavior.

VirusTotal

Google-owned malware scanning service VirusTotal announced on Tuesday that Mac OS X files scanned by users will be executed in a sandbox in order to analyze their behavior.

VirusTotal

As threats designed to target Apple devices become more common — recent examples include XcodeGhost and WireLurker —, researchers may want to analyze the behavior of OS X files that look suspicious.

Sandbox execution was first introduced by VirusTotal in 2012 for Windows PE files and the feature was expanded in 2013 to include Android applications (APKs). Now, users will also be able to view behavioral reports when scanning Mach-O and DMG files and ZIP archives containing a Mac application.

VirusTotal has pointed out that Mac files will be executed in a sandbox regardless of the scan method being used — behavioral reports are produced for files scanned via virustotal.com, the OS X Uploader utility, or the API.

The new “Behavioural information” tab introduced for OS X file scans provides a report on the actions and events performed by the targeted file or by the processes it launches or injects.

The information includes a list of opened, read, moved and written files, created processes, HTTP and DNS requests, and TCP connections. The malware scanning service has provided example reports for DMG files, Mach-O files, and ZIP archives containing a Mac app.

Customers with “allinfo” or private API privileges will see the behavior information in the API responses. The information is indexed and searchable for customers of VirusTotal Intelligence, the premium service that offers advanced features.

When it launched the sandbox execution feature in 2012, VirusTotal noted that its goal is not to replace existing online sandboxes, but to provide complementary reports that will further help the security community.

Advertisement. Scroll to continue reading.

Earlier this year, the service announced the launch of a project dubbed “Trusted Source,” designed to allow major software developers to share their files in order to ensure that antivirus products don’t erroneously flag them as malicious.

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Discover strategies for vendor selection, integration to minimize redundancies, and maximizing ROI from your cybersecurity investments. Gain actionable insights to ensure your stack is ready for tomorrow’s challenges.

Register

Dive into critical topics such as incident response, threat intelligence, and attack surface management. Learn how to align cyber resilience plans with business objectives to reduce potential impacts and secure your organization in an ever-evolving threat landscape.

Register

People on the Move

Dan Pagel has been named the new CEO of risk management and remediation firm Brinqa.

The City of Phoenix has promoted Mitch Kohlbecker to the role of Chief Information Security Officer.

Gigamon has promoted Tony Jarjoura to CFO and Ram Bhide has been hired as Senior VP of engineering.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.