Lazarus Group's macOS 'Fileless' Implant
The Lazarus APT group is distributing a trojanized macOS application named UnionCryptoTrader.dmg that installs a launch daemon for persistence, downloads and executes secondary payloads in-memory, and communicates with the command and control server unioncrypto.vip.
The Lazarus Group, known for targeting cryptocurrency exchanges, continues to evolve its macOS capabilities. This campaign, observed in late 2019, involves a trojanized application named UnionCryptoTrader.dmg, masquerading as a legitimate cryptocurrency trading platform. The application, hosted on the domain unioncrypto.vip (104.168.167.16), is delivered to victims via an assumed download link. Once executed, the application installs a persistent launch daemon and then downloads and executes further payloads directly in memory, minimizing its footprint on the compromised system. This ‘fileless’ approach, combined with targeting of cryptocurrency platforms, demonstrates Lazarus Group’s ongoing interest in financial gain and their increasing sophistication in macOS malware development.
Attack Chain
- The victim downloads a disk image (UnionCryptoTrader.dmg) from unioncrypto.vip.
- The victim mounts the DMG, revealing an unsigned package installer (UnionCryptoTrader.pkg).
- The victim executes the package, which prompts for administrator credentials due to the installation of a launch daemon.
- The postinstall script within the package moves a hidden plist file (.vip.unioncrypto.plist) to
/Library/LaunchDaemons/vip.unioncrypto.plistfor persistence. - The script also moves a hidden executable (.unioncryptoupdater) to
/Library/UnionCrypto/unioncryptoupdaterand sets its permissions to executable. - The launch daemon (
/Library/UnionCrypto/unioncryptoupdater) is executed and configured to run on each system reboot. - The
unioncryptoupdaterbinary gathers system information, including the serial number using IOKit (IOPlatformSerialNumber). - The
unioncryptoupdaterbinary connects to the C2 serverunioncrypto.vip/updateto download and execute payloads in memory.
Impact
This attack targets employees of cryptocurrency exchanges. Successful infection allows the Lazarus Group to gain persistent access to systems within these organizations, potentially leading to theft of cryptocurrency, sensitive financial data, or disruption of trading operations. The fileless nature of the secondary payload execution makes detection more difficult, increasing the attacker’s dwell time and potential for damage.
Recommendation
- Monitor for the creation of launch daemons by unsigned installers, specifically those moving plist files to
/Library/LaunchDaemons(see attack chain steps 4-5). - Monitor network connections to
unioncrypto.vipfrom unusual processes or those located in/Library/UnionCryptousing the provided IOCs. - Deploy the Sigma rule “Detect UnionCryptoTrader Package Installation” to identify the execution of the malicious installer.
- Block the domain
unioncrypto.vipat the network perimeter (DNS or firewall) to prevent initial infection and C2 communication using the provided IOC. - Enable endpoint detection and response (EDR) systems to detect and block the execution of unsigned binaries from
/Library/UnionCrypto.
Detection coverage 3
Detect UnionCryptoTrader Package Installation
highDetects the execution of the UnionCryptoTrader.pkg installer.
Detect UnionCryptoUpdater Execution
highDetects the execution of the unioncryptoupdater binary from /Library/UnionCrypto.
Detect Network Connection to UnionCrypto VIP Domain
highDetects network connections to the UnionCrypto VIP domain.
Detection queries are available on the platform. Get full rules →
Indicators of compromise
1
ip
1
md5
1
url
| Type | Value |
|---|---|
| md5 | 6588d262529dc372c400bef8478c2eec |
| ip | 104.168.167.16 |
| url | https://www.unioncrypto.vip/download/W6c2dq8By7luMhCmya2v97YeN |