<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Hackingteam — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/hackingteam/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 26 Feb 2016 07:47:15 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/hackingteam/feed.xml" rel="self" type="application/rss+xml"/><item><title>HackingTeam RCS Implant Installer Analysis</title><link>https://feed.craftedsignal.io/briefs/2016-02-hackingteam-rcs/</link><pubDate>Fri, 26 Feb 2016 07:47:15 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2016-02-hackingteam-rcs/</guid><description>An implant installer for HackingTeam's RCS implant uses Apple's native OS X encryption scheme and a custom packer to deliver a persistent implant, indicating a potential resurgence of the group and an evolution in their techniques for macOS malware.</description><content:encoded><![CDATA[<p>The Objective-See blog post from February 2016 analyzes an implant installer believed to be associated with HackingTeam&rsquo;s Remote Control System (RCS) implant. The analysis reveals that this installer employs Apple&rsquo;s native OS X encryption scheme and a custom packer, a notable shift in tactics. The sample, available on VirusTotal, was initially undetected by AV vendors. This suggests a potential resurgence of HackingTeam and an effort to evade traditional detection methods. The use of encryption and packing highlights the need for advanced analysis techniques and tools to uncover the malicious payload. The installer drops and executes a persistent implant, along with an encrypted configuration file. This activity indicates a sophisticated attempt to maintain long-term access to the compromised system.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker deploys the encrypted HackingTeam RCS implant installer to the target macOS system.</li>
<li>The installer uses Apple&rsquo;s native OS X encryption scheme to protect the binary.</li>
<li>The installer decrypts itself using a static Blowfish key.</li>
<li>The decrypted installer unpacks itself from a custom packer.</li>
<li>The unpacked installer drops a persistent implant to <code>~/Library/Preferences/8pHbqThW/_9g4cBUb.psr</code>.</li>
<li>The installer drops an encrypted data file to <code>~/Library/Preferences/8pHbqThW/Bs-V7qIU.cYL</code>.</li>
<li>The installer executes the dropped implant using <code>execve</code>.</li>
<li>The persistent implant installs itself as a user Launch Agent with the name <code>com.apple.FinderExtAvt.plist</code>, ensuring persistence upon reboot.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful infection leads to the installation of the HackingTeam RCS implant on the macOS system. This allows the attackers to remotely control the system, potentially exfiltrate sensitive data, monitor user activity, and install additional malicious software. The use of encryption and packing significantly hinders detection and analysis, potentially allowing the implant to remain undetected for an extended period. While the number of victims is not specified, the use of sophisticated techniques suggests targeted attacks against high-value individuals or organizations.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor file creation events for the creation of files in <code>~/Library/Preferences/8pHbqThW/</code> to detect potential RCS implant activity.</li>
<li>Deploy the Sigma rule to detect the creation of the LaunchAgent file associated with the RCS implant.</li>
<li>Block the listed IOCs, specifically the SHA256 hashes of the implant installer and persistent implant, at the endpoint to prevent execution.</li>
<li>Utilize tools like Objective-See&rsquo;s BlockBlock and KnockKnock to detect and block persistence attempts and enumerate installed binaries.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>hackingteam</category><category>rcs</category><category>malware</category><category>macos</category></item></channel></rss>