<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Coldroot — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/coldroot/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 18:10:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/coldroot/feed.xml" rel="self" type="application/rss+xml"/><item><title>Coldroot RAT Targeting macOS</title><link>https://feed.craftedsignal.io/briefs/2024-01-coldroot-rat/</link><pubDate>Wed, 03 Jan 2024 18:10:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-coldroot-rat/</guid><description>The Coldroot RAT is a cross-platform backdoor targeting macOS systems, providing remote attackers persistent access through a launch daemon, masquerading as an Apple audio driver, and beaconing to a command and control server.</description><content:encoded><![CDATA[<p>The Coldroot RAT is a cross-platform backdoor that targets macOS systems. This RAT masquerades as a legitimate Apple audio driver to avoid detection. Discovered in early January 2018, the malware persists on infected systems by installing a launch daemon, ensuring it is automatically restarted after each reboot. The malware beacons out to a command and control (C2) server for tasking, and also functions as a keylogger. It attempts to modify the TCC.db database, but this functionality is thwarted by System Integrity Protection (SIP). This RAT poses a significant threat to macOS users as it can provide unauthorized access to sensitive data and allow attackers to maintain persistent control over compromised systems.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The user downloads a DMG file containing the malicious application bundle, <code>com.apple.audio.driver.app</code>.</li>
<li>The user executes the application, which prompts for user credentials via a standard authentication prompt.</li>
<li>The malware loads its settings from <code>com.apple.audio.driver.app/Contents/MacOS/conx.wol</code>, which contains C2 information and other configuration.</li>
<li>The malware copies itself to <code>/private/var/tmp/com.apple.audio.driver.app/Contents/MacOS/com.apple.audio.driver</code>.</li>
<li>The malware creates a launch daemon plist file at <code>/Library/LaunchDaemons/com.apple.audio.driver.plist</code>.</li>
<li>The malware uses <code>/bin/cp</code> to install the launch daemon plist.</li>
<li>The malware uses <code>/bin/launchctl</code> to launch the newly installed launch daemon.</li>
<li>The malware beacons to the C2 server specified in the <code>conx.wol</code> file, awaiting further commands, and logs keystrokes to <code>adobe_logs.log</code>.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful infection by the Coldroot RAT allows attackers to maintain persistent access to macOS systems. The malware&rsquo;s keylogging capabilities enable attackers to steal credentials and sensitive information. While the malware attempts to modify the TCC.db database, SIP prevents this action. However, the persistent access and data theft capabilities still pose a significant risk. The number of victims and specific sectors targeted are currently unknown.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process executions for the use of <code>/bin/cp</code> and <code>/bin/launchctl</code> to install launch daemons, as highlighted in the attack chain. Deploy the <code>Detect Coldroot Launch Daemon Installation</code> Sigma rule to detect this behavior.</li>
<li>Monitor network connections to the C2 server IP address <code>45.77.49.118</code> listed in the IOC table and block the domain at the firewall.</li>
<li>Implement file integrity monitoring for <code>/Library/LaunchDaemons/com.apple.audio.driver.plist</code> to detect unauthorized modifications of launch daemons. Deploy the <code>Detect Coldroot Launch Daemon File Creation</code> Sigma rule to detect the creation of this launch daemon.</li>
<li>Scan systems for files matching the SHA256 hash <code>c20980d3971923a0795662420063528a43dd533d07565eb4639ee8c0ccb77fdf</code> to identify potentially infected machines.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>rat</category><category>macos</category><category>persistence</category><category>coldroot</category></item></channel></rss>