ngettext

JSON
executablemacOS92.8 KBarm64

Unknown executable — purpose unclear without binary inspection

This ad-hoc signed arm64 binary contains 94 functions and references 4 network endpoints, suggesting it performs network communication. It includes 2 file paths and 2 URLs in its strings. Without access to the actual binary code, function names, or network endpoint details, the specific purpose and security implications cannot be determined. Analysis requires examination of the binary's imports, exported symbols, and runtime behavior.AI

Fingerprint

Platform
macOS
Type
executable
Arch
arm64
Min OS
26.0.0
SDK
26.0.0
File Size
92.8 KB
UUID
BA825869-E97E-356C-AC44-D60E28426CBA
Analyzed
2026-04-09T09:10:55Z
CDHash
b2648fe5962d1b8b7f8c4bc1722d4bc31beb07ae2a18c9f4815a5028abce2141

Interesting Strings

Network Surface

Networking Frameworks

DNA Capability Vector

Location
0
Keychain
0
Network
0
Storage
0
Hardware
0
IPC
0
Analytics
0
Security
0
System
0

Behavioral Profile

URL Endpoints
2
Telemetry Strings
0
File Paths
2
Bundle IDs
0
IOKit Constants
0
Library Functions
20

Structural HashesSHA-256

Static Libraries20 / 94 functions identified

Functions(94)

0x100001b80main
0x100001ed8usage
0x10000209cexpand_escapes
0x10000228cdcnpgettext_expr
0x1000023a0last_component
0x1000023e4base_len
0x10000242cc_strcasecmp
0x100002480c32isalnum
0x1000024c4c32isspace
0x100002504close_stdout
0x100002594flush_stdout
0x1000025dcerror_tail
0x1000026d4OUTLINED_FUNCTION_0
0x1000026e8rpl_free
0x10000271cfwriteerror
0x100002724do_fwriteerror
0x100002824fwriteerror_no_ebadf
0x10000282c_getopt_internal_r
0x100002d54exchange
0x100002e08process_long_option

Imports67 symbols from 3 dylibs

Exports80

_getopt_internal_r0x282c
_getopt_long_only_r0x33b8
_getopt_long_r0x339c
_gl_start_options0x4b68
_mh_execute_header0x0
base_len0x23e4
c32isalnum0x2480
c32isspace0x24c4
c_strcasecmp0x242c
close_stdout0x2504
error0x6a60
error_at_line0x6bb0
error_message_count0xcdf8
error_one_per_line0xcdfc
error_print_progname0xce00
exit_failure0xc000
freea0x3524
fwriteerror0x271c
fwriteerror_no_ebadf0x2824
get_next_option0x4da0
gl_get_setlocale_null_lock0x5a70
last_component0x23a0
locale_charset0x33c8
main0x1b80
mbrtoc320x354c
mbslen0x35b0
mbsstr0x3750
mem_cd_iconv0x5b10
mmalloca0x34b4
program_name0xcdf0
proper_name0x4ebc
proper_name_utf80x5700
reallocarray0x5908
rpl_free0x26e8
rpl_getopt0x3320
rpl_getopt_internal0x32bc
rpl_getopt_long0x3390
rpl_getopt_long_only0x33ac
rpl_optarg0xce08
rpl_opterr0xc008
rpl_optind0xc004
rpl_optopt0xc00c
rpl_setlocale0x593c
rpl_strtoul0x5f24
set_program_name0x4e28
setlocale_null0x59c0
setlocale_null_r0x5948
setlocale_null_r_unlocked0x5a84
setlocale_null_unlocked0x5a7c
str_cd_iconv0x5d7c
str_iconv0x5e24
strnlen10x5eec
trim20x61d4
verror0x69dc
verror_at_line0x6a88
x2nrealloc0x6624
x2realloc0x661c
xalloc_die0x68a0
xcalloc0x6760
xcharalloc0x655c
xicalloc0x679c
ximalloc0x6540
ximemdup0x67f0
ximemdup00x6828
xinmalloc0x65f4
xirealloc0x6594
xireallocarray0x65b0
xizalloc0x677c
xmalloc0x6524
xmem_cd_iconv0x68ec
xmemdup0x67b8
xnmalloc0x65cc
xnrealloc0x64ec
xpalloc0x6684
xrealloc0x6578
xreallocarray0x6508
xstr_cd_iconv0x6928
xstr_iconv0x6964
xstrdup0x6864
xzalloc0x6740