Skip to content

Latest commit

 

History

History
93 lines (49 loc) · 4.57 KB

screengrabs.md

File metadata and controls

93 lines (49 loc) · 4.57 KB

Screengrabs

Checksum for installer package verified from clipboard

grab18

Warning of SKID mismatch and certificate revocation (KeRanger)

grab19

Application signed with Developer ID

grab1

Malware application (KeRanger) with revoked certificate and SKID mismatch

Notice the SKID mismatch, i.e. the SKID from the code signature used by the attacker differs from the original certificate by the Transmission developer.

Notice the bogey RTF file, which is actually an executable part of the ransomware scheme.

grab2

Malware application (OSX.CreativeUpdater) with fake codesigning certificate and SKID mismatch

Compare the main executable code signature (added by attacker) with the other signature (original by Mozilla), i.e. this is a legit app bundle within a malware app bundle to fool the user.

Notice the bogey script file, which starts the download of the cryptominer malware.

Please note that the security assessment using spctl can still accept a codesigning certificate, while the more up-to-date verification with security already shows it as revoked.

grab13

Application with entitlements (Apple System)

Notice that there is no CRL (certificate revocation list) for Apple System signatures (leaf certificate: "Software Signing"), so let's hope none of Apple's private codesigning keys ever get leaked.

grab3

Application with entitlements (Mac App Store)

grab10

Application with valid but expired codesigning certificate

grab20

Application with untrusted third-party code signature and missing SKID

grab17

Adhoc-signed application with missing SKID

grab9

Unsigned application

grab8

Kernel extension

grab16

Codesigned command line interface with initial SKID scan

grab6

Codesigned disk image (DMG)

grab4

Malware disk image (DMG) with hash mismatch and signed with a fake code signature

grab12

Signed installer package

grab5

xip archive with verified hash and signed with Developer ID

grab11

xip archive signed with locally trusted key

grab14

Application with cracked executables using proprietary code signatures

Notice that the main code signature is unchanged: the SKID comparison shows a match.

grab7

Auxiliary list with unsigned executable files

Note that some developers erroneously set the executable bits on files that do not need it; this really messes things up, and wys scans will take longer in these cases.

grab15