Analysis of macOS spyware, are you still dare to download cracked macOS software easily?

0 23
0x01 Event OverviewRecently, during the macOS terminal threat hunting, a macOS t...

0x01 Event Overview

Recently, during the macOS terminal threat hunting, a macOS terminal spyware was found. After in-depth analysis, it was found that this malware is specifically designed for macOS and will steal a large amount of sensitive information from the victim's machine, including browser auto-fill, passwords, cookies, wallet information, keychain passwords, system information of the operating system, specific format files in desktop and document folders, and macOS startup password. Through trace analysis, the main method of spreading this macOS spyware backdoor is through the release of free cracked software and paid software activation software on software download websites. For example, Axure RP cracked software, CleanMyMac X crack version. Finally, it guides users to download and run malicious spyware.

0x02 Event Analysis

0x021 Method of Spread

https://muzamilpc.com/ All cracked software downloads on this website will jump to hidden backdoor download addresses after hijacking.

Analysis of macOS spyware, are you still dare to download cracked macOS software easily?

Take Axure RP crack version as an example
image

Click to download
image

It will jump to a download website named SecureMedia For Mac
image

The software that appears to be a cracked version of Axure RP ultimately downloads macOS spyware AppleApp.dmg
image

AppleApp.dmg is unsigned. SHA256:997901477F7DA2060B1A3E087E866B2FE3E766662D208249614B74F74505534A
image

Open the interface

image

VT detection status: 2/57
image

Similarly, let's take another example of CleanMyMac X free version
http://cleanmac-app.top/index.html
image

Click to download the free version, which appears to be CleanMyMac X, but the downloaded one is still a macOS spyware
image

Open the interface
image

Setup.dmg is also unsigned, SHA256:64CB30DF490AD9B4988A5A19C0E745CA9D0DFEF39B5522E61E3214AF7BB0815B
image

Other similar download sites for cracked software spreading poison:

1.https://worldforcrack.com/

2.https://kingsoftz.com/

3.https://muzamilpc.com/

4.http://cleanmac-app.top/

0x022 Static analysis

Take AppleApp.dmg as an example for analysis

Drag the macho file into ida, enter the main function, set the window display size and method, and then create a thread to execute the "_s3huyyyYbcfU_" function
image

Follow up on the "_s3huyyyYbcfU_" function
image

Continue with the dotask function
image

Directly obtain the credential files of browsers based on Chromium
image

Obtain the user's Cookies, Login Data, and Web Data
image

Obtain information about the encrypted wallet browser extension
image

image

Obtain the user's Keychain file, which is a secure container for storing sensitive information on Apple devices. It is an encrypted database used to store passwords, certificates, private keys, and other sensitive data.
image

Call osascript to create a dialog box to trick the user into entering their account and password.
image

At the same time, call dscl to locally verify the boot password of the password passed by the user
image

Continue until the correct password is entered
image

Obtain system information, and exit if a virtual machine is detected
image

Obtain files with specific desktop format suffixes of the user
image

Obtain cookies, historical login records, and credential information in the Firefox browser
image

Obtain the user's cold wallet related configuration
image

After obtaining sensitive information, call ditto to compress it into a zip package
image

Call the sendlog function to send the collected sensitive information to the c2 server at 185.106.93.154 port 80.
image

After the sensitive data is externally transmitted, delete the folder and compressed package created earlier.
image

0x023 Dynamic Debugging

Set a breakpoint before the sendlog function and follow the execution.
image

Prompt to enter password
image

Entering an incorrect password randomly will prompt that the wrong password was entered.
image

After entering the correct password, a prompt for TCC permission request window will appear.
image

The following is the malicious trojan stealing users' sensitive information. Browser auto-fill passwords, Cookies, specific format files captured, login-keychain, passwords entered by users, system information.
image

0x024 Behavior Detection

Here is a simple list of alarms based on suspicious behavior detection.
1. Suspicious local boot password brute force behavior
image

2. Suspicious browser credential access behavior
image

3. Suspicious information collection behavior
image

4. Suspicious credential phishing behavior
image

5. Suspicious compressed package creation behavior
image

0x03 Event Summary

Reviewing this macOS spyware incident can reveal that the essence of such a security event is still a problem with the terminal software supply chain management. If corporate employees can obtain the required software within the corporate internal network, then it is highly likely that they will not go outside to download and install cracked software provided by third-party untrusted sources. I think it is possible to address this terminal software supply chain poisoning risk scenario from the three aspects of before, during, and after the event.

Before the event: Establish a security baseline for office terminals, provide employees with a trusted official software download channel within the corporate internal network, regularly conduct security risk awareness training for employees, and continuously improve the basic defense capability of office terminals and the safety awareness of employees;

During the event: Based on the ATT&CK framework, through attack simulation, data analysis, strategy development & optimization, continuously improve the threat awareness capability of office terminals;

After the event: Establish a rapid hemostasis SOP mechanism for emergency response, review mechanism, reward and punishment reporting system, and continuously improve the risk disposal capability of office terminals;

0x04 Appendix-IOC

C2&Malicious Domains

185.106.93.154:80

https://worldforcrack.com/

https://kingsoftz.com/

https://muzamilpc.com/

http://cleanmac-app.top/

SHA256

997901477F7DA2060B1A3E087E866B2FE3E766662D208249614B74F74505534A

64CB30DF490AD9B4988A5A19C0E745CA9D0DFEF39B5522E61E3214AF7BB0815B

你可能想看:
最后修改时间:
admin
上一篇 2025年03月26日 23:58
下一篇 2025年03月27日 00:21

评论已关闭