user@threatcheck.sh ~ threat-analysis
bash
$ analyze-threat HackTool:MacOS/BloodHound.B!MTB
HackTool:MacOS/BloodHound.B!MTB - Windows Defender threat signature analysis

HackTool:MacOS/BloodHound.B!MTB - Windows Defender Threat Analysis

$ cat analysis.txt
=== THREAT ANALYSIS REPORT ===
Threat Name: HackTool:MacOS/BloodHound.B!MTB
Classification:
Type:HackTool
Platform:MacOS
Family:BloodHound
Detection Type:Concrete
Known malware family with identified signatures
Variant:B
Specific signature variant within the malware family
Suffix:!MTB
Detected via machine learning and behavioral analysis
Detection Method:Behavioral
Confidence:Very High
False-Positive Risk:Low

Concrete signature match: Hack Tool - Tool used to exploit vulnerabilities for macOS platform, family BloodHound

Summary:

This threat is a detection of BloodHound, a legitimate open-source penetration testing tool used for Active Directory reconnaissance and attack path mapping. Its presence on an unauthorized system, particularly detected via behavioral analysis, indicates potential malicious activity such as reconnaissance, privilege escalation, or lateral movement by an attacker.

Severity:
Medium
VDM Static Detection:
No detailed analysis available from definition files.
Known malware which is associated with this threat:
Filename: azurehound
f53d8040d84edd75ebe9e232e6d4b020e9368b9477434d91889ed1ec48fa558e
21/03/2026
Filename: azurehound
2fa73ce2b5dcd03adf58a6a7692ef97fb005b967c2336686dd45495ec8b967e6
21/03/2026
Filename: azurehound
454c3881ca6a4de23eed3d09884fa43485ee0a80de54187259639ce60949ba02
21/03/2026
Filename: azurehound
04a162a5b7da204dcb3c099294fa3cf502af6f925073d0edddc30e98993f505f
21/03/2026
Filename: azurehound
36e65d9e1863623ec984fc4f0d8d75720309710ef8e9a7a5e06c8d4a870b3b13
21/03/2026
Remediation Steps:
Isolate the affected MacOS system immediately. Investigate the source and context of the BloodHound deployment to determine if it was authorized. Scan the system for other malicious tools or indicators of compromise, review Active Directory logs for suspicious activity, and remove all detected files associated with BloodHound.
=== END REPORT ===
$ reanalyze-threat
This analysis was last updated on 21/03/2026. Do you want to analyze it again?
$ ls available-commands/
user@threatcheck.sh:~$