[!IMPORTANT]
This analysis is based on the information available at the time of the investigation. Unfortunately, the original payload URLs were removed before the primary analysis (if you managed to grab them in time, hit me up!). Therefore, a direct inspection of the actual malicious files was not possible. Hence, the analysis may be incomplete due to missing information about the payload.
This analysis delves into the malicious DPRK-built macOS application bundle, 1inch-analysis.app, which targeted Anton Bukov from 1inch. The attack was executed by the fake security researcher Nick L. Franklin. This incident, which is part of a broader deception and exploitation attempt, can be attributed[^1] with high confidence to the AppleJeus/Citrine Sleet/UNC4736 DPRK team.
[^1]: See Radiant's incident update here, along with the on-chain link. Additionally, the payloads exhibit distinct pattern matching.
Always be paranoid!
Directory Structure of 1inch-analysis.app