


This is a strong indicator that the malware is in an early stage of its macOS development by it authors. If the user were to inspect this file, it would likely be a dead giveaway that something is awry.

This is a strange approach by the attackers, as it doesn’t seem to serve any functional purpose. The file itself appears benign, as the malware does not require any user interaction to continue to infect the user. This type of file, in this case resembling the Microsoft Word document icon, will open up the icon in the user’s default image viewer, like Preview.app on macOS.
#MALWARE APP FOR MAC WINDOWS#
ico file extension is used for Windows icon file. Java is not installed out-of-the-box on macOS but is still used by many different pieces of software, as well as by many organizations. jar file is the necessity to have the Java Runtime Environment (JRE) installed locally. One point to note on distributing malware via a. jar file form of distribution in order to target more than just the Windows environment, in this case, macOS. It is likely that the developers of the malware used the. The macOS variant of this malware can be either a compiled binary or a. It is currently unknown how extensive macOS XLoader campaigns have been since that time. Check Point Research discovered forum posts with the macOS variant of XLoader being offered as early as October 2020. While not highly sophisticated, its ability to capture network traffic, clipboard data, and passwords has broadened its appeal and usefulness. In its earliest iteration, XLoader (Formbook) was intended to be a simple keylogger/spyware.
