CrossRAT Multi-Platform Surveillanceware Analysis
CrossRAT is a Java-based, multi-platform surveillance tool targeting Windows, macOS, and Linux systems, capable of file system manipulation, screenshot capture, and persistence.
CrossRAT is a cross-platform implant discovered by the EFF/Lookout and analyzed by Objective-See. Written in Java, this malware targets Windows, macOS, and Linux systems. The malware sample analyzed was named ‘hmar6.jar’. CrossRAT possesses capabilities such as manipulating the file system, capturing screenshots, and running arbitrary DLLs on Windows systems for secondary infection. It focuses on establishing persistence on infected systems to ensure continued access. The malware gathers OS-specific information to tailor its actions on the compromised host and communicate effectively with its command and control server.
Attack Chain
- The malware, typically a JAR file (e.g., hmar6.jar), is executed on the target system, requiring Java Runtime Environment.
- CrossRAT identifies the operating system (Windows, macOS, or Linux) using
System.getProperty("os.name")and OS-specific commands like/usr/bin/sw_verson macOS or examining/etc/os-releaseon Linux. - The malware establishes persistence. On macOS, it creates a Launch Agent in
/Library/LaunchAgents/or/Users/<user>/Library/LaunchAgents/, writing a plist file. - The Launch Agent plist configures the system to execute the malware (java -jar <malware.jar>) upon system startup via the “RunAtLoad” key.
- The malware gathers system information, including OS version, kernel build, and architecture, by executing commands such as
uname -a. - CrossRAT establishes communication with its command and control (C2) server to receive further instructions.
- Based on the instructions from the C2, CrossRAT manipulates the file system, takes screenshots, or executes arbitrary DLLs (on Windows).
Impact
CrossRAT allows attackers to perform surveillance activities on infected systems. Successful infection enables exfiltration of sensitive data, manipulation of files, and persistent access to the compromised system. The cross-platform nature of CrossRAT enables attackers to target a wide range of victims regardless of their operating system.
Recommendation
- Monitor process creation events for the execution of
java -jarfrom unusual locations, as this is a common method for launching CrossRAT (see rule: “Detect CrossRAT Execution via Java”). - Monitor the creation of new Launch Agents in
/Library/LaunchAgents/or/Users/<user>/Library/LaunchAgents/directories on macOS, specifically those executing JAR files (see rule: “Detect CrossRAT macOS Persistence”). - Inspect network connections originating from Java processes for suspicious command and control traffic.
Detection coverage 2
Detect CrossRAT Execution via Java
highDetects the execution of CrossRAT via the java -jar command
Detect CrossRAT macOS Persistence
mediumDetects the creation of a Launch Agent plist file used by CrossRAT for persistence on macOS
Detection queries are available on the platform. Get full rules →