Lazarus Group's Dacls RAT Targets macOS
The Lazarus Group is distributing a new variant of the Dacls RAT targeting macOS systems via a trojanized application, installing a hidden executable and attempting persistence.
The Lazarus Group, a North Korean APT, is actively distributing a new variant of the Dacls RAT targeting macOS systems. This malware is delivered via a trojanized application named TinkaOTP.app, mimicking previous social engineering tactics employed by the group. Discovered in May 2020, the macOS variant of Dacls RAT shares similarities with its Windows/Linux counterparts, suggesting a cross-platform campaign. Upon execution, the malware installs a hidden executable in the user’s Library directory and attempts to establish persistence as a launch agent. The macOS variant exhibits a failed persistence mechanism due to a directory check bug. Researchers speculate potential exploitation of CVE-2019-3396, a Confluence vulnerability, aligning with findings alongside the Windows/Linux version. The Lazarus Group continues to evolve its macOS malware, necessitating proactive detection and response measures.
Attack Chain
- The user downloads and mounts the malicious TinkaOTP.dmg disk image.
- The user executes the TinkaOTP.app application.
- TinkaOTP.app executes
/bin/cpto copy/Volumes/TinkaOTP/TinkaOTP.app/Contents/Resources/Base.lproj/SubMenu.nibto~/Library/.mina. - TinkaOTP.app executes
chmod +x ~/Library/.minato set the executable bit on the copied file. - TinkaOTP.app executes the copied file
~/Library/.mina. ~/Library/.minaattempts to create a launch agent file at/Library/LaunchAgents/com.aex.lop.agent.plist.- The persistence attempt fails because the
/Library/LaunchAgentsdirectory does not exist by default. - The RAT establishes command and control with its operators (details not available in source).
Impact
Successful exploitation leads to the installation of a remote access trojan (RAT) on the victim’s macOS system, granting the Lazarus Group unauthorized access. The malware can potentially exfiltrate sensitive data, execute arbitrary commands, and perform other malicious activities. The scope of targeting is currently unknown, but the Lazarus Group has historically targeted financial institutions and cryptocurrency exchanges. The failed persistence mechanism in this variant might limit the long-term impact unless other persistence methods are employed.
Recommendation
- Monitor process creations for executions of
/bin/cpcopying files to the user’s Library directory, especially with the destination.mina, using the “Detect Dacls RAT Installation” Sigma rule. - Monitor process creations for executions of the hidden executable
~/Library/.minausing the “Detect Dacls RAT Executable” Sigma rule. - Inspect network connections from non-standard applications to external IPs (requires further analysis to build a rule for this specific threat).
- Block the identified malicious file hashes (SHA256) from the IOC list at the network and endpoint levels.
- If running Atlassian Confluence, patch CVE-2019-3396 to prevent potential initial access.
Detection coverage 3
Detect Dacls RAT Installation
highDetects the installation of the Dacls RAT by monitoring for the copy command used to move the SubMenu.nib file.
Detect Dacls RAT Executable
highDetects execution of the Dacls RAT executable in the user's Library directory.
Detect Dacls RAT Launch Agent Creation Attempt
mediumDetects attempts to create a Launch Agent for persistence, specifically targeting the known Dacls RAT path.
Detection queries are available on the platform. Get full rules →
Indicators of compromise
2
hash_sha256
| Type | Value |
|---|---|
| hash_sha256 | 899e66ede95686a06394f707dd09b7c29af68f95d22136f0a023bfd01390ad53 |
| hash_sha256 | 846d8647d27a0d729df40b13a644f3bffdc95f6d0e600f2195c85628d59f1dc6 |