OSX/MaMi DNS Hijacking Malware
OSX/MaMi is a macOS malware that hijacks DNS settings and installs a malicious certificate into the system keychain to intercept network traffic, while also possessing capabilities for taking screenshots, simulating mouse events, persisting as a launch item, downloading and uploading files, and executing commands.
OSX/MaMi, a macOS malware identified in January 2018, targets users by hijacking their DNS settings and installing a malicious certificate into the System keychain. This allows attackers to potentially intercept all network traffic. The malware, version 1.1.0, exhibits a range of functionalities beyond DNS hijacking, including the ability to take screenshots, generate simulated mouse events, persist as a launch item, download and upload files, and execute arbitrary commands. This malware communicates with various domains such as honouncil.info, gorensin.info and squartera.info to report activity, posing a significant risk to user privacy and data security.
Attack Chain
- The malware is initially downloaded from a hosting site, such as
http://regardens.info/. - The downloaded Mach-O executable is executed on the macOS system.
- MaMi modifies the system’s DNS settings, replacing the legitimate DNS servers with malicious ones, specifically
82.163.143.135and82.163.142.137. - The malware installs a malicious certificate into the System keychain, likely using
security add-trusted-certcommand to bypass certificate pinning. - It may establish persistence by configuring itself as a launch item using
programArgumentsandrunAtLoadmethods. - MaMi takes screenshots of the user’s desktop using the
takeScreenshotAt:method. - The malware exfiltrates collected data and sends reports to command and control servers, including
honouncil.info,gorensin.info, andsquartera.infoover HTTP. - The attacker gains complete control over the victim’s network traffic.
Impact
Successful exploitation allows attackers to intercept network traffic, potentially stealing sensitive information like usernames, passwords, and financial data. Victims may experience redirection to malicious websites, phishing attacks, or installation of further malware. The malware also has the ability to take screenshots and simulate mouse clicks, potentially granting attackers access to sensitive data displayed on the screen or enabling them to perform actions on the infected system remotely.
Recommendation
- Monitor network traffic for DNS queries directed to the malicious DNS servers
82.163.143.135and82.163.142.137. - Monitor for outbound network connections to the reporting domains
honouncil.info,gorensin.info, andsquartera.infousing network_connection category rules. - Implement the provided Sigma rules to detect suspicious processes modifying DNS settings or installing certificates.
- Monitor process creations for execution of unsigned Mach-O binaries.
Detection coverage 2
Detect DNS Server Modification via Network Configuration
highDetects modification of DNS server settings by monitoring network configuration changes.
Detect Network Connection to MaMi Reporting Domains
mediumDetects network connections to domains used by MaMi for reporting activity.
Detection queries are available on the platform. Get full rules →
Indicators of compromise
3
domain
2
ip
1
url
| Type | Value |
|---|---|
| url | http://regardens.info/ |
| ip | 82.163.143.135 |
| ip | 82.163.142.137 |
| domain | honouncil.info |
| domain | gorensin.info |
| domain | squartera.info |