<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Applejeus — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/applejeus/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 15:30:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/applejeus/feed.xml" rel="self" type="application/rss+xml"/><item><title>Lazarus Group's AppleJeus macOS Backdoor via JMT Trader</title><link>https://feed.craftedsignal.io/briefs/2024-01-applejeus-macos/</link><pubDate>Wed, 03 Jan 2024 15:30:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-applejeus-macos/</guid><description>The Lazarus APT group is distributing a macOS backdoor named AppleJeus via a fake cryptocurrency trading application called JMT Trader, persisting through a launch daemon and communicating with the C&amp;C server beastgoc.com.</description><content:encoded><![CDATA[<p>The Lazarus APT group is distributing a new variant of its AppleJeus macOS backdoor through a fake cryptocurrency trading application called &ldquo;JMT Trader.&rdquo; The attackers created a fake company and website (jmttrading.org) to distribute the malicious application. The JMTTrader_Mac.dmg disk image contains a package installer (JMTTrader.pkg) that installs the AppleJeus backdoor. The malware utilizes a launch daemon for persistence and communicates with a command-and-control server to receive instructions. This campaign, observed in October 2019, targets macOS users interested in cryptocurrency trading and highlights Lazarus Group&rsquo;s continued focus on financial gain. The analyzed sample&rsquo;s SHA1 hash is 74390fba9445188f2489959cb289e73c6fbe58e4.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A user is lured to the fake JMT Trading website (jmttrading.org) and downloads the JMTTrader_Mac.dmg disk image.</li>
<li>The user mounts the disk image, which contains the JMTTrader.pkg installer.</li>
<li>The user executes the JMTTrader.pkg installer, which prompts for administrative privileges.</li>
<li>The postinstall script within the package moves <code>.org.jmttrading.plist</code> to <code>/Library/LaunchDaemons/org.jmttrading.plist</code> and sets permissions.</li>
<li>The script creates the <code>/Library/JMTTrader</code> directory and moves <code>.CrashReporter</code> to <code>/Library/JMTTrader/CrashReporter</code>, setting execute permissions.</li>
<li>The script executes <code>/Library/JMTTrader/CrashReporter</code> with the <code>Maintain</code> command-line argument for initial connection.</li>
<li>The <code>CrashReporter</code> binary connects to the C&amp;C server at <code>beastgoc.com</code> via HTTPS POST requests to <code>/grepmonux.php</code>, sending system information (token, version, PID) after XOR &ldquo;encryption&rdquo;.</li>
<li>The backdoor awaits commands from the C&amp;C server to perform malicious activities.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful infection allows the Lazarus Group to gain persistent remote access to the compromised macOS system. This can lead to the theft of cryptocurrency, sensitive financial data, or further propagation of malware within the victim&rsquo;s network. While specific victim counts are unavailable, previous AppleJeus campaigns have targeted cryptocurrency exchanges, potentially resulting in substantial financial losses.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creations for <code>/Library/JMTTrader/CrashReporter</code> executing with the <code>Maintain</code> argument, using the Sigma rule &ldquo;Detect AppleJeus CrashReporter Execution&rdquo;.</li>
<li>Monitor network connections to <code>beastgoc.com</code> on TCP port 443, using the Sigma rule &ldquo;Detect AppleJeus C2 Communication&rdquo;.</li>
<li>Block the C&amp;C domain <code>beastgoc.com</code> at the DNS resolver to prevent initial communication.</li>
<li>Inspect macOS systems for the presence of the launch daemon <code>/Library/LaunchDaemons/org.jmttrading.plist</code> and the <code>CrashReporter</code> binary in <code>/Library/JMTTrader/</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>applejeus</category><category>macos</category><category>lazarus group</category><category>backdoor</category><category>cryptocurrency</category></item><item><title>Lazarus Group Macloader Malware Analysis and Repurposing</title><link>https://feed.craftedsignal.io/briefs/2024-01-lazarus-macloader/</link><pubDate>Wed, 03 Jan 2024 15:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lazarus-macloader/</guid><description>The Lazarus group's macloader malware (OSX.AppleJeus.C) uses a launch daemon for persistence and executes downloaded payloads directly from memory, communicating with a C2 server to retrieve second-stage payloads, posing a significant threat due to its fileless execution and potential for repurposing.</description><content:encoded><![CDATA[<p>The Lazarus Group&rsquo;s macloader malware, internally named &lsquo;macloader&rsquo; and externally identified as OSX.AppleJeus.C, exhibits advanced techniques for macOS malware. Discovered in late 2019, this malware employs a launch daemon for persistence at <code>/Library/LaunchDaemons/vip.unioncrypto.plist</code> pointing to <code>/Library/UnionCrypto/unioncryptoupdater</code>. A key feature is its ability to execute second-stage payloads directly from memory, enhancing stealth and complicating forensic analysis. The malware communicates with its command and control (C&amp;C) server at <code>https://unioncrypto.vip/update</code> to retrieve these payloads. This &ldquo;fileless&rdquo; execution capability makes it a potent threat, as the payloads never touch the file system. The malware beacons out providing basic system information (macOS version, serial number) and the implant version (&ldquo;1.0&rdquo;). This malware is notable for its in-memory execution of downloaded payloads.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The malware is initially deployed on the system (delivery mechanism unspecified in the source).</li>
<li>Persistence is established via a launch daemon at <code>/Library/LaunchDaemons/vip.unioncrypto.plist</code> pointing to <code>/Library/UnionCrypto/unioncryptoupdater</code>.</li>
<li>The malware beacons out to the C&amp;C server <code>https://unioncrypto.vip/update</code> to check for updates. It sends system information, including macOS version and serial number, in the POST request.</li>
<li>The C&amp;C server responds with an HTTP 200 OK, containing at least 0x400 bytes of base64-encoded data representing the second-stage payload.</li>
<li>The malware base64-decodes the received data.</li>
<li>The malware calculates an MD5 hash of the system&rsquo;s serial number (prefixed with 0x18).</li>
<li>The malware decrypts part of the decoded payload using AES-CBC with a key and IV.</li>
<li>The malware loads and executes the decrypted second-stage payload directly from memory using the <code>load_from_memory</code> function. The final objective is to execute arbitrary code without writing to disk.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful execution of this malware allows attackers to gain a persistent foothold on macOS systems, execute arbitrary code, and potentially exfiltrate sensitive data. The fileless nature of the second-stage payload makes detection and forensic analysis significantly more challenging. The malware&rsquo;s capabilities could be repurposed by other threat actors for various malicious activities, including espionage, data theft, or deployment of additional malware. The number of victims and specific sectors targeted are not specified in the source.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for the creation of launch daemons with the name <code>vip.unioncrypto.plist</code> and pointing to <code>/Library/UnionCrypto/unioncryptoupdater</code> using a file integrity monitoring tool (related to Attack Chain step 2).</li>
<li>Implement a network detection rule to identify connections to the C&amp;C server <code>unioncrypto.vip</code> (IOC - domain).</li>
<li>Deploy the Sigma rule &ldquo;Detect Base64 Encoded Data in Process Memory&rdquo; to identify potential in-memory payloads (related to Attack Chain step 5).</li>
<li>Monitor process creation events for <code>unioncryptoupdater</code> to identify potential execution of the first-stage loader.</li>
<li>Implement the Sigma rule &ldquo;Detect MD5 Hash of System Serial Number&rdquo; to identify potential MD5 hashing of the Mac OS serial number.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>lazarus-group</category><category>macos</category><category>malware</category><category>fileless</category><category>applejeus</category></item></channel></rss>