mobileassetd
executablemacOS226.8 KBx86_64, arm64
System keychain and Secure Enclave manager — manages encryption keys and credential storage
Manages access to the Secure Enclave and system keychain, handling sealed key storage (SIK) and device encryption keys. Reads and writes keychain items, manages keychain group membership, and controls access to the device key bag. Exposes 6 XPC services for other system components to request key operations and credential access. Interacts with NVRAM to persist system state and accesses private storage areas. Communicates with 11 network endpoints and manages 140 bundle identifiers, suggesting coordination with multiple system services and applications.AI
Fingerprint
- Platform
- macOS
- Type
- executable
- Arch
- x86_64, arm64
- Min OS
- 26.1.0
- SDK
- 26.1.0
- File Size
- 226.8 KB
- UUID
- 37E42B7F-0774-3926-A866-FB8A1E228387
- Analyzed
- 2026-04-09T09:56:21Z
- CDHash
- f1487d17e203d17b98f850530dcda8889cc108550670361f7b3f3bdd30179ddd
Capabilities
KeychainKeychain access group membership
keychain-access-groupsKeychainDevice key bag (encryption keys)
/System/Library/PrivateFrameworks/MobileKeyBag.framework/Versions/A/MobileKeyBagStorageRead and write system NVRAM variables
com.apple.private.iokit.system-nvram-allow[object Object]StoragePrivate storage area access
com.apple.private.security.storage.MobileAssetGenerativeModels[object Object]StorageException: access additional file paths
com.apple.security.exception.files.absolute-path.read-write/private/var/run/MobileAssetCritialDomainsUpdated.plist/private/var/run/MobileAssetStartupActivation.doneThisBoot/private/var/run/MobileAssetSuspendSystemOptionalForSoftwareUpdate.nonce/private/var/code_coverage//private/var/run/com.apple.mobileassetd-AutoAsset-DeviceBoot-UUID/private/var/run/bootSessionMA.txt
IpcException: access additional Mach services
com.apple.security.exception.mach-lookup.global-nameFrameworks7
Entitlements63
com.apple.security.exception.files.absolute-path.read-write
/private/var/run/MobileAssetCritialDomainsUpdated.plist/private/var/run/MobileAssetStartupActivation.doneThisBoot/private/var/run/MobileAssetSuspendSystemOptionalForSoftwareUpdate.nonce/private/var/code_coverage//private/var/run/com.apple.mobileassetd-AutoAsset-DeviceBoot-UUID/private/var/run/bootSessionMA.txt
Interesting Strings
Bundle IDs(140)
File Paths(22)
Network Surface
Networking Frameworks
Endpoints(11)
DNA Capability Vector
Location
0
Keychain
4
Network
0
Storage
3
Hardware
0
IPC
1
Analytics
0
Security
0
System
0
Behavioral Profile
URL Endpoints
4
Telemetry Strings
0
File Paths
22
Bundle IDs
140
IOKit Constants
0
Library Functions
10
Structural HashesSHA-256
Static Libraries10 / 81 functions identified
Identified Libraries
Functions(81)
0x100000dc0sub_100000dc0
0x100000e68sub_100000e68
0x100001120sub_100001120
0x1000014e0sub_1000014e0
0x100001510sub_100001510
0x1000017b0sub_1000017b0
0x1000019a4sub_1000019a4
0x1000019dcsub_1000019dc
0x100001a30sub_100001a30
0x100001a68sub_100001a68
0x100001aa0sub_100001aa0
0x100001bc0sub_100001bc0
0x100001c60sub_100001c60
0x100001c88sub_100001c88
0x100001c90sub_100001c90
0x100001cc0sub_100001cc0
0x100001cf0sub_100001cf0
0x100001f08sub_100001f08
0x100001f18sub_100001f18
0x100001f20sub_100001f20
Imports86 symbols from 6 dylibs
Exports1
_mh_execute_header0x0