• 1 Vote(s) - 5 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Per-version report - GetOverX Shield macOS 1.0.0
#1
Tested version: GetOverX Shield macOS 1.0.0.1
Installer SHA-256 hash: [84c7062f4a9715f9842cc5f4179ad9cbac58b5cff212bded6c09421fc593989f]

1. Multi-AV result (VirusTotal)
- Engines: 1.0.0.0
- Result:0/71
All Passed

2. Behaviour summary in sandbox (MITRE ATT&CK for macOS)
When the macOS installer was executed in a sandbox environment, the following categories were observed:
- Execution: launch of helper tools and installation routines via standard macOS installer mechanisms.
- Persistence: creation of launch agents / launch daemons and registration of system extensions or network extensions.
- Defense Evasion: use of signed and protected components, plus controlled interception for monitoring.
- Discovery: collection of basic system, user and process information required for endpoint protection.

No typical macOS malware behaviours were observed:
- No unauthorised modification of user home directories beyond configuration and logs.
- No mass encryption or deletion of user files.
- No covert network connections to unknown C2 servers.

3. Lab tests (summary)
- Installation and removal on clean macOS virtual machines or test devices (supported macOS versions).
- Verified:
  - Correct loading of system / network extensions.
  - Real-time monitoring and alerting capabilities.
  - Log generation and integration with the central management console.

Conclusion:
The tested macOS build behaves as expected for an endpoint protection agent:
- External engines do not report classic malware; any isolated detection is related to strict policies on system and network extensions.
- Behavioural analysis shows installation, registration of protection components and monitoring activity, without signs of macOS-specific backdoors, data theft or ransomware behaviour.

Link Test:
https://www.virustotal.com/gui/file/84c7...1fc593989f
  Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)