(After some back and forth regarding broken DLLs on our release two weeks back…)
By popular demand, the Omino Suite including Kaleidoscope and Snake is now available for both Mac OS X and Windows.
Verfehlen ebendiese nicht im Entferntesten, welche Seite vermittels Snake Frog Hybrid via Ctrl + D (Personal Computer) oder Command + D (Mac OS) zu bookmarken. Wenn ebendiese ein Mobiltelefon handhaben, Sachkenntnis selbige zweite Geige dasjenige. Snake (with a twist) in Swift for Mac OS X 10.10+. Contribute to sfsam/Snk development by creating an account on GitHub.
Notes for release 2.1 are:
- Available for Windows and Mac OS X
- Works on AE CS6 and Later
- Installed manually by dragging
- Kaleidoscope speedup with multithreads
- Snake rendering errors with tiny holes substantially reduced
- Minor parameter name changes (old projects still work fine)
Get it at the first link on the download page.
How To Install
In the zip file are two folders, one for Mac OS X, and one for Windows. Drag the appropriate folder as shown below.
Any problems (or feature requests, of course) please comment or email me, poly@omino.com. Enjoy!
Snake is a known malware on Windows OS since 2008. In 2017 fox-it found a variant of this malware that was ported to macOS.The malware arrived as the file 'Install Adobe Flash Player.zip' which is a modify version of Adobe Flash installation. Within the zip file there is a macOs application bundle signed with a legitimate Apple Developer ID (revoked already):
Source: CheckPoint
Once executed the malware will execute its script first prior the real Adobe installation. It will use AppleScript in order to execute its infection script with administrator permissions:
Source: CheckPoint
The infection vector contains two scripts. The first will copy the malware files to target locations '/Library/Scripts/' and create a LaunchDaemon in order to persist on the system.
Snake Vs Snake Mac Os Update
Source: CheckPoint
The second script 'installd.sh' will check if 'installdp' process is running, and if not, will execute it.It is unknown what the infection vector is, if any infection was there at all. From the malicious binary file 'installdp' it might be implied that this version of the malware is not finished as there are a lot of debug strings:
Source: CheckPoint
Links:
Samples: