msgunfmt

JSON
executablemacOS88.8 KBarm64

Unknown utility — executes functions with network connectivity

This ad-hoc signed arm64 executable contains 35 functions and establishes connections to 5 network endpoints. It references 2 file paths and 2 URLs or endpoints in its strings. The binary imports 11 public frameworks but lacks sufficient function names or string data to determine its specific purpose or security implications. The ad-hoc signature indicates it was self-signed rather than signed with a developer certificate.AI

Fingerprint

Platform
macOS
Type
executable
Arch
arm64
Min OS
26.0.0
SDK
26.0.0
File Size
88.8 KB
UUID
60C06351-85BD-3B57-9EB9-9356609BBA40
Analyzed
2026-04-09T09:10:32Z
CDHash
ee2eec7e1b69d382dd22b99e1e66a282e535d40051a001033528afd77d52740e

Interesting Strings

Network Surface

Networking Frameworks

DNA Capability Vector

Location
0
Keychain
0
Network
0
Storage
0
Hardware
0
IPC
0
Analytics
0
Security
0
System
0

Behavioral Profile

URL Endpoints
2
Telemetry Strings
0
File Paths
2
Bundle IDs
0
IOKit Constants
0
Library Functions
4

Structural HashesSHA-256

Static Libraries4 / 35 functions identified

Functions(35)

0x100003570main
0x100003be4usage
0x100003f88read_one_file
0x100003fa0read_mo_file
0x10000464cget_uint32
0x1000046bcget_string
0x10000473cget_sysdep_string
0x100004a38OUTLINED_FUNCTION_0
0x100004a50OUTLINED_FUNCTION_1
0x100004a64OUTLINED_FUNCTION_2
0x100004a78msgdomain_read_java
0x100004b64execute_and_read_po_output
0x100004c3cmsgdomain_read_csharp
0x100004e80execute_and_read_po_output
0x100004f58read_resources_file
0x1000050b4execute_and_read_po_output
0x100005188msgdomain_read_tcl
0x100005474hash_string
0x1000054b4read_mo_file.cold.1
0x1000054e4read_mo_file.cold.2

Imports79 symbols from 5 dylibs

Exports9

_mh_execute_header0x0
hash_string0x5474
main0x3570
msgdomain_read_csharp0x4c3c
msgdomain_read_java0x4a78
msgdomain_read_tcl0x5188
read_mo_file0x3fa0
read_resources_file0x4f58
verbose0xc05b