← Back to Index

LetsDefend - macOS Malware

Created: 02/04/2024 10:27 Last Updated: 02/04/2024 12:02


**macOS Malware** ![deafcac04a663c8450964ac2fb8bcffb.png](/resources/deafcac04a663c8450964ac2fb8bcffb.png)

Mac StealthWare has recently emerged as a new and formidable threat in the world of MacOS security. Unlike typical malware, Mac StealthWare is highly sophisticated and uses advanced evasion techniques to avoid detection by traditional security measures.

The malware is typically distributed through malicious email attachments, fake software updates, or compromised websites. Unsuspecting users inadvertently download and run the malware, believing it to be legitimate software.

File Location: C:\Users\LetsDefend\Desktop\ChallengeFile\sample.7z

File Password: infected


Start Investigation

How many web browsers does this malware target for data extraction?

Lets start by looking at what we have before tackle sample file 9bd5cf923b77ff6b4a4cafd84f7653c9.png We got Detect It Easy and 3 Debuggers here fef801a285716475170bada5cf0f2f4f.png I used Ghidra to decomplie so I can read C code which on main() function there are several string concatenates and string copy here

After take a look at some function calls, this sample file/malware is some kind of a file grabber malware and its target several things on infected system.

These are 7 browsers I found from this function - Google Chrome - Firefox - Brave - Vivaldi - Edge - Opera - OperaGX

7

How many different cryptocurrency wallets are targeted by malware?

461dc4698e03a3b973ec8ce7b3ef8c61.png Still on main() function After scroll down for a bit, I found 4 crypto wallets listed here so this malware targeting crypto wallets too - Electrum - Coinomi - Exodus - Atomic

4

What is the specific part of the file path that follows the user's home directory that is related to Coinomi and is used by the malware?

80530602a24f88c84ab323d0fc154bcc.png

Coinomi/wallets/

What is the Telegram identifier that is used by malware?

7cdb732e88277dfa6f1f527f1df09859.png There is a Telegram identifier here which mean after this malware gather all informations it designed for, maybe it will send them to a specific telegram chat

6N38VWS5BX.ru.keepcoder.Telegram

What IP address is used by malware to send data over HTTP?

On Ghidra, you can go to Windows then Defined Data or Defined Strings to see which data or strings that have been assigned to varibles 884f3aa5e0bef0b0dd92d16b1c3553c9.png eaf311244a7b246ce72d83426441e0da.png aca3c2b538ceaae872164ecfdb38778d.png 4f18eef0beddb42e502b730a612f6cac.png Which I found an IP address from send_data_via_http function which indicate that it will use HTTP POST method and send data to this IP address.

91.103.252.213

What is the offset of the function used to grab chromium? Answer Format: 0x***

8765223471f72767fa66f16d6f5d0c90.png I used Chro in a Filter inside Ghidra and found SearchAndGrabChromium function which explains itself what it will do 33639ec8759451c9b11bad06100f33b0.png I opened sample file on IDA Freeware and find this function, which will be easier to get an offset than Ghidra in my opinion.

0x100022DF0

What is the offset of the “senddatavia_http” function used by the malware? Answer Format: 0x***

ecdf9c4de302259276859d3bf1d20341.png Just find this function on IDA Freeware and then you're good to go

0x100021DF0

What command is used by the malware to obtain information about hardware components on the MacOS system?

72590fab1690bff06f05f5e93ea03d2a.png There is a function called userinfo, I was curious what it is and then I found that this malware execute this command to get handware information on executed host.

system_profiler SPHardwareDataType

Summary

After take a look at this malware, look like its an infostealer malware that targeted macOS by grabing files and cryptocurrency wallets from specific browsers then compress it and send to specific IP address.

![e0ebd7fb5cafc07294541030fcb57390.png](/resources/e0ebd7fb5cafc07294541030fcb57390.png) https://app.letsdefend.io/my-rewards/detail/83079f762a61485390bf7be5287752a7