Mach-O, APK and LLM Code Summary

RationalEdge's Team
2 min read
Mach-O, APK and LLM Code Summary

Over the past few weeks, we have shipped three significant platform updates.

Mach-O Support

REDS now fully analyzes Mach-O binaries — both iOS and macOS — including Universal (FAT) formats. This is one of the most comprehensive Mach-O analyses you will find in any malware database and analysis platform. The capability is powered by machofile, our self-contained, open-source Python module built with a specific focus on malware analysis and reverse engineering, with zero external dependencies.

Mach-O analysis in REDS

APK Support

Android application packages are now in scope, with 106 unique APK-specific fields available for search and correlation — 84 feature fields and 22 code analysis fields — on top of standard file attributes and metadata.

APK analysis in REDS

LLM-Assisted Code Analysis

Analysts can now ask questions about decompiled and disassembled functions directly from the analysis view. What does this function do? Why is this behavior suspicious? Instead of staring at code and piecing it together manually, you get context on function behavior and intent — another step toward the explainability we are building into everything. The goal has always been the same: show the evidence behind every assessment, not just a verdict.

LLM-assisted function analysis in REDS


With these releases, REDS now covers all four major OS platforms and file formats — PE, Mach-O (iOS and macOS), ELF, and APK — along with broad architecture support: x86/64, ARM/AArch64, MIPS, PowerPC, RISC-V (32/64-bit), and more. This brings full analysis coverage to samples targeting embedded and OT devices as well.

MoRE to come. Book a demo if you want to see it in action.

Ready to Transform Your Threat Analysis?

Get started with REDS - the intelligence platform built by threat analysts, for threat analysts.