Coldroot RAT Targeting macOS
The Coldroot RAT is a cross-platform backdoor targeting macOS systems, providing remote attackers persistent access through a launch daemon, masquerading as an Apple audio driver, and beaconing to a command and control server.
The Coldroot RAT is a cross-platform backdoor that targets macOS systems. This RAT masquerades as a legitimate Apple audio driver to avoid detection. Discovered in early January 2018, the malware persists on infected systems by installing a launch daemon, ensuring it is automatically restarted after each reboot. The malware beacons out to a command and control (C2) server for tasking, and also functions as a keylogger. It attempts to modify the TCC.db database, but this functionality is thwarted by System Integrity Protection (SIP). This RAT poses a significant threat to macOS users as it can provide unauthorized access to sensitive data and allow attackers to maintain persistent control over compromised systems.
Attack Chain
- The user downloads a DMG file containing the malicious application bundle,
com.apple.audio.driver.app. - The user executes the application, which prompts for user credentials via a standard authentication prompt.
- The malware loads its settings from
com.apple.audio.driver.app/Contents/MacOS/conx.wol, which contains C2 information and other configuration. - The malware copies itself to
/private/var/tmp/com.apple.audio.driver.app/Contents/MacOS/com.apple.audio.driver. - The malware creates a launch daemon plist file at
/Library/LaunchDaemons/com.apple.audio.driver.plist. - The malware uses
/bin/cpto install the launch daemon plist. - The malware uses
/bin/launchctlto launch the newly installed launch daemon. - The malware beacons to the C2 server specified in the
conx.wolfile, awaiting further commands, and logs keystrokes toadobe_logs.log.
Impact
Successful infection by the Coldroot RAT allows attackers to maintain persistent access to macOS systems. The malware’s keylogging capabilities enable attackers to steal credentials and sensitive information. While the malware attempts to modify the TCC.db database, SIP prevents this action. However, the persistent access and data theft capabilities still pose a significant risk. The number of victims and specific sectors targeted are currently unknown.
Recommendation
- Monitor process executions for the use of
/bin/cpand/bin/launchctlto install launch daemons, as highlighted in the attack chain. Deploy theDetect Coldroot Launch Daemon InstallationSigma rule to detect this behavior. - Monitor network connections to the C2 server IP address
45.77.49.118listed in the IOC table and block the domain at the firewall. - Implement file integrity monitoring for
/Library/LaunchDaemons/com.apple.audio.driver.plistto detect unauthorized modifications of launch daemons. Deploy theDetect Coldroot Launch Daemon File CreationSigma rule to detect the creation of this launch daemon. - Scan systems for files matching the SHA256 hash
c20980d3971923a0795662420063528a43dd533d07565eb4639ee8c0ccb77fdfto identify potentially infected machines.
Detection coverage 2
Detect Coldroot Launch Daemon Installation
highDetects the installation of a launch daemon by Coldroot RAT via cp and launchctl.
Detect Coldroot Launch Daemon File Creation
highDetects the creation of Coldroot's launch daemon file.
Detection queries are available on the platform. Get full rules →
Indicators of compromise
1
filename
1
hash_sha256
| Type | Value |
|---|---|
| hash_sha256 | c20980d3971923a0795662420063528a43dd533d07565eb4639ee8c0ccb77fdf |
| filename | conx.wol |