VMRay Labs found a DMG file containing a malicious Shell Script used to download and execute Atomic Stealer remained fully undetected on VirusTotal for two days.
The Shell Script applies basic obfuscation via encoding and shows strong indicators to be AI generated due to its comments, proper error handling, and logging.Â
Â
While the stealer capability is mainly written in AppleScript, the loader component is shipped as a universal Mach-O binary, targeting both, x86- and ARM-based systems.
0 / 60 detections on VirusTotal on February 3rd 2025
In a nutshell:
Â
No detections on VT for two days (6/60 detections as of today)
Â
DMG file that uses a likely AI generated Shell Script as entry point
Â
Shell Script drops a Mach-O universal binary for x86 and ARM architecture
Â
Executable decodes Atomic Stealer’s AppleScript (osascript) with a custom base64 alphabet
Â
Sandbox evasion via checking known usernames: maria, run, jackiemac, bruno
Â
User’s password is collected via AppleScript by simply asking the user for it
Ready to stress-test your malware sandbox? Join us for a no-fluff, all-demo webinar that shows you real techniques to evaluate and optimize your sandboxing solution!