Monitor traffic for calls to external Command & Control (C2) servers.

Inspect the .plist files for version info and permissions.

Use tools like Ghidra or Hopper to reverse-engineer the core logic. 4. Objective

Watch for hidden files created in /private/tmp/ or ~/Library/ .

It is a technical assessment designed to test macOS forensic and security analysis skills.

Verify the SHA-256 hash to ensure file integrity.