Hoobamon_reward_96.zip
Once authorized, the script inside the archive begins a rapid "harvesting" process:
is a malicious archive associated with recent AMOS (Atomic macOS Stealer) campaigns targeting Mac users. The "story" of this file is one of social engineering and automated data theft, often disguised as a reward or software crack to trick users into bypassing system security. The Origin and Distribution
The file typically surfaces on fraudulent websites or via phishing messages that promise free rewards, game cheats, or cracked versions of popular software. According to researchers at Trend Micro , these campaigns frequently use alluring filenames like "Hoobamon_Reward" to lower a user's guard. The "Infection" Sequence Hoobamon_Reward_96.zip
: It extracts saved passwords, cookies, and credit card information from Chrome, Firefox, and Safari.
: Inside the archive is usually a .dmg or an app bundle designed to look official. Once authorized, the script inside the archive begins
: It searches for sensitive documents, Keychain data, and desktop files.
: It specifically targets browser extensions for cryptocurrency wallets like MetaMask and Coinbase. According to researchers at Trend Micro , these
: A user downloads the .zip file believing it contains a legitimate prize or utility.