An open API service indexing awesome lists of open source software.

https://github.com/dantex86/iremove-malware-analysis

Comprehensive analysis of iRemove malware targeting macOS systems - Security research and threat intelligence
https://github.com/dantex86/iremove-malware-analysis

cybersecurity iocs macos malware-analysis network-forensics security-research threat-intelligence yara-rules

Last synced: 2 months ago
JSON representation

Comprehensive analysis of iRemove malware targeting macOS systems - Security research and threat intelligence

Awesome Lists containing this project

README

          

# ๐Ÿ•ต๏ธ iRemove.tools Surveillance Malware Analysis

**Historical Case Study & Threat Intelligence Research**

This repository contains the complete investigative analysis of the iRemove.tools surveillance malware campaign - a comprehensive 3+ year study (2022-2025) that uncovered a sophisticated global criminal enterprise operating surveillance software disguised as MDM bypass tools.

[![Research](https://img.shields.io/badge/research-complete-green.svg)](docs/threat-intelligence/)
[![License](https://img.shields.io/badge/license-MIT-green.svg)](LICENSE)
[![Threat Intel](https://img.shields.io/badge/threat--intel-STIX%202.1-blue.svg)](iocs_stix.json)

## ๐ŸŽฏ **OVERVIEW**

This repository documents the complete investigation into iRemove.tools - what began as analysis of a suspicious MDM bypass tool uncovered a global surveillance operation with advanced evasion techniques, multi-language support, and sophisticated criminal infrastructure.

The investigation led to the development of **ARTEMIS** (now maintained separately), but this repository preserves the original research, methodologies, and findings that exposed this significant threat.

> **๐Ÿ“ฃ IMPORTANT NOTE**: The ARTEMIS malware analysis toolkit has been extracted into its own dedicated repository for ongoing development. For the latest version of the analysis tools, visit:
>
> **๐Ÿน [ARTEMIS Malware Analysis Toolkit](https://github.com/your-username/artemis-malware-toolkit)**
>
> This repository remains focused on the historical iRemove.tools investigation and serves as a comprehensive case study in threat research methodology.
### **๐Ÿ” Investigation Highlights:**

- ๐Ÿ“Š **3+ Year Timeline** - Complete operational analysis (2022-2025)
- ๐ŸŒ **Global Scale** - 9-language international criminal enterprise
- ๐ŸŽญ **Advanced Evasion** - Sophisticated techniques to avoid detection
- ๐Ÿ’ฐ **Commercial Operation** - Professional website, payment processing, customer support
- ๐Ÿ” **Technical Analysis** - Complete malware teardown and IOC extraction
- ๐Ÿ“‹ **Threat Intelligence** - STIX 2.1 formatted indicators and YARA rules
- ๐Ÿ›๏ธ **Attribution Analysis** - Criminal infrastructure and operational assessment

## ๐Ÿ”Ž **ACCESSING THE RESEARCH**

```bash
# Clone the research repository
git clone
cd iremove-malware-analysis

# View threat intelligence reports
cat docs/threat-intelligence/FINAL_THREAT_INTELLIGENCE_REPORT.md
cat docs/threat-intelligence/OPERATIONAL_INTELLIGENCE_REPORT.md

# Examine IOC data
cat iocs_stix.json # STIX 2.1 format
cat iocs_csv.csv # CSV format for SIEM
cat src/rules/*.yar # YARA detection rules

# For active malware analysis, see ARTEMIS toolkit:
# https://github.com/your-username/artemis-malware-toolkit
```

## ๐Ÿ“ฆ **TOOLKIT COMPONENTS**

### **Core Analysis Engine:**
- **`src/scripts/auto_analysis.sh`** - Main automated analysis script
- **`src/scripts/ioc_analyzer.sh`** - IOC extraction and analysis
- **`src/scripts/network_monitor.sh`** - Network monitoring setup
- **`src/rules/*.yar`** - YARA detection rules
- **`examples/test_sample.txt`** - Test file with embedded IOCs for validation

### **Professional Threat Intelligence:**
- **`THREAT_INTELLIGENCE_PACKAGE.md`** - Comprehensive threat analysis report
- **`iocs_stix.json`** - STIX 2.1 formatted indicators
- **`iocs_csv.csv`** - CSV format for SIEM integration
- **`iremove_malware.yar`** - YARA detection rules

### **Documentation:**
- **`docs/threat-intelligence/`** - Threat intelligence reports
- **`docs/analysis-reports/`** - IOC and analysis reports
- **`docs/installation/`** - Setup and installation guides
- **`docs/guides/`** - Usage guides and examples

### **Archive:**
- **`archive/analysis-sessions/`** - Historical analysis sessions
- **`archive/legacy-docs/`** - Legacy documentation files

## ๐Ÿ” **ANALYSIS CAPABILITIES**

### **Static Analysis:**
```bash
โœ… File metadata and hashing (SHA256, MD5)
โœ… String extraction and analysis
โœ… IOC identification (domains, IPs, emails)
โœ… Binary symbol extraction
โœ… Dependency analysis
โœ… macOS .app bundle support
```

### **Threat Intelligence Generation:**
```bash
โœ… Professional markdown reports
โœ… STIX 2.1 threat intelligence format
โœ… YARA rule creation
โœ… CSV IOC feeds for SIEM integration
โœ… Network monitoring setup
โœ… Attribution analysis
```

## ๐Ÿ“Š **SAMPLE OUTPUT**

```bash
$ ./auto_analysis.sh "/Applications/1Password.app"

๐Ÿ” Starting Automated Malware Analysis
Target: /Applications/1Password.app/Contents/MacOS/1Password
Analysis Directory: malware_analysis_20250624_013624

๐Ÿ“‹ PHASE 1: Basic File Information โœ…
๐Ÿ”ค PHASE 2: String Analysis โœ…
๐Ÿ”ง PHASE 3: Binary Analysis โœ…
๐ŸŒ PHASE 4: Network Monitoring Setup โœ…
๐Ÿ“Š PHASE 5: Generating Analysis Report โœ…

๐Ÿ“ˆ Quick Summary:
File: /Applications/1Password.app/Contents/MacOS/1Password
SHA256: b5e29be38a8ee1bde467edf46a0aceda924904b017165a1cdbb1eb41c620cc27
Strings: 3077 extracted
Potential domains: 151 identified
Analysis files: 6 generated
```

## ๐ŸŽ“ **REAL-WORLD CASE STUDY**

ARTEMIS was developed during the analysis of a sophisticated surveillance campaign:

- **Target**: iRemove.tools MDM bypass malware
- **Duration**: 3+ year surveillance operation (2022-2025)
- **Scope**: Global criminal enterprise with 9-language support
- **Impact**: Professional threat intelligence package generated
- **Outcome**: Complete operational disruption analysis

[View Complete Case Study โ†’](FINAL_THREAT_INTELLIGENCE_REPORT.md)

## ๐Ÿ› ๏ธ **SYSTEM REQUIREMENTS**

### **Operating System:**
- macOS 10.15 or later (tested on macOS Sonoma)
- ARM64 or Intel architecture

### **Dependencies:**
```bash
# Built-in macOS tools (no additional installation required)
- file, strings, shasum, md5
- nm, otool (Xcode Command Line Tools)
- grep, find, sort, wc

# Optional enhancements
- class-dump (for detailed Objective-C analysis)
- tcpdump (for network monitoring)
```

## ๐Ÿ“‹ **USAGE EXAMPLES**

### **Basic Analysis:**
```bash
# Analyze system binary
./src/scripts/auto_analysis.sh /usr/bin/ssh

# Analyze downloaded application
./src/scripts/auto_analysis.sh ~/Downloads/suspicious.app

# Analyze with test sample
./src/scripts/auto_analysis.sh examples/test_sample.txt
```

### **Professional Workflow:**
```bash
# 1. Run analysis
./src/scripts/auto_analysis.sh suspicious_file

# 2. Review generated reports
cd malware_analysis_YYYYMMDD_HHMMSS/
cat analysis_report.md

# 3. Check IOCs
cat potential_iocs.txt

# 4. Set up monitoring (if needed)
sudo ./src/scripts/network_monitor.sh
```

## ๐Ÿ† **PROFESSIONAL APPLICATIONS**

### **Cybersecurity Career Development:**
- **Resume Enhancement**: "Developed automated malware analysis toolkit"
- **Portfolio Projects**: Working security tools with professional output
- **Interview Preparation**: Concrete examples of technical capabilities
- **Certification Support**: Practical experience for GCIH, GCFA, GCTI

### **Security Operations:**
- **Incident Response**: Rapid analysis of suspicious files
- **Threat Hunting**: IOC extraction and intelligence generation
- **Forensic Analysis**: Professional documentation and reporting
- **Security Research**: Methodology template for threat investigation

## ๐Ÿ“š **DOCUMENTATION**

- [๐Ÿš€ Usage Guide](docs/guides/USAGE_GUIDE.md)
- [๐Ÿงช Lab Setup Instructions](docs/installation/LAB_SETUP_GUIDE.md)
- [๐Ÿ” Threat Intelligence Reports](docs/threat-intelligence/)
- [๐Ÿ“Š Analysis Reports](docs/analysis-reports/)
- [๐Ÿ“ Contributing Guidelines](CONTRIBUTING.md)
- [๐Ÿ”’ Security Policy](SECURITY.md)

## ๐Ÿค **CONTRIBUTING**

ARTEMIS was developed through real-world malware investigation. Contributions are welcome:

1. **Fork the repository**
2. **Create feature branch** (`git checkout -b feature/enhancement`)
3. **Commit changes** (`git commit -am 'Add new feature'`)
4. **Push to branch** (`git push origin feature/enhancement`)
5. **Create Pull Request**

## ๐Ÿ“„ **LICENSE**

This project is licensed under the MIT License - see the [LICENSE](LICENSE) file for details.

## ๐Ÿ™ **ACKNOWLEDGMENTS**

- **iRemove.tools Investigation**: Real-world case study that drove development
- **Cybersecurity Community**: Threat intelligence sharing and methodology
- **macOS Security Research**: Apple platform analysis techniques

## ๐Ÿ“ž **CONTACT**

For questions, collaboration, or professional inquiries:
- **GitHub Issues**: For bug reports and feature requests
- **Security Research**: For threat intelligence collaboration
- **Professional Development**: For career and certification discussions

---

## ๐ŸŽฏ **VALIDATION TESTING**

ARTEMIS has been successfully tested on multiple platforms:

### **Test Results:**
```bash
โœ… Custom Test Sample: 4 domains, 1 IP, 1 email extracted
โœ… System Binary (/usr/bin/curl): 2441 strings, 27 domains
โœ… macOS Application (1Password): 3077 strings, 151 domains
โœ… Binary Analysis: Symbols, dependencies, class dumps
โœ… Report Generation: Professional markdown with timestamps
```

### **Production Readiness:**
- โœ… **Error Handling**: Comprehensive file validation and helpful messages
- โœ… **macOS Integration**: Native .app bundle support with automatic executable detection
- โœ… **Professional Output**: Industry-standard analysis reports and IOC formats
- โœ… **Real-world Validation**: Successfully analyzed legitimate applications

---

**ARTEMIS - From Surveillance Detection to Security Excellence** ๐Ÿน