<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Surveillanceware — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/surveillanceware/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 17:31:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/surveillanceware/feed.xml" rel="self" type="application/rss+xml"/><item><title>CrossRAT Multi-Platform Surveillanceware Analysis</title><link>https://feed.craftedsignal.io/briefs/2024-01-crossrat/</link><pubDate>Wed, 03 Jan 2024 17:31:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-crossrat/</guid><description>CrossRAT is a Java-based, multi-platform surveillance tool targeting Windows, macOS, and Linux systems, capable of file system manipulation, screenshot capture, and persistence.</description><content:encoded><![CDATA[<p>CrossRAT is a cross-platform implant discovered by the EFF/Lookout and analyzed by Objective-See. Written in Java, this malware targets Windows, macOS, and Linux systems. The malware sample analyzed was named &lsquo;hmar6.jar&rsquo;. CrossRAT possesses capabilities such as manipulating the file system, capturing screenshots, and running arbitrary DLLs on Windows systems for secondary infection. It focuses on establishing persistence on infected systems to ensure continued access. The malware gathers OS-specific information to tailor its actions on the compromised host and communicate effectively with its command and control server.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The malware, typically a JAR file (e.g., hmar6.jar), is executed on the target system, requiring Java Runtime Environment.</li>
<li>CrossRAT identifies the operating system (Windows, macOS, or Linux) using <code>System.getProperty(&quot;os.name&quot;)</code> and OS-specific commands like <code>/usr/bin/sw_vers</code> on macOS or examining <code>/etc/os-release</code> on Linux.</li>
<li>The malware establishes persistence. On macOS, it creates a Launch Agent in <code>/Library/LaunchAgents/</code> or <code>/Users/&lt;user&gt;/Library/LaunchAgents/</code>, writing a plist file.</li>
<li>The Launch Agent plist configures the system to execute the malware (java -jar &lt;malware.jar&gt;) upon system startup via the &ldquo;RunAtLoad&rdquo; key.</li>
<li>The malware gathers system information, including OS version, kernel build, and architecture, by executing commands such as <code>uname -a</code>.</li>
<li>CrossRAT establishes communication with its command and control (C2) server to receive further instructions.</li>
<li>Based on the instructions from the C2, CrossRAT manipulates the file system, takes screenshots, or executes arbitrary DLLs (on Windows).</li>
</ol>
<h2 id="impact">Impact</h2>
<p>CrossRAT allows attackers to perform surveillance activities on infected systems. Successful infection enables exfiltration of sensitive data, manipulation of files, and persistent access to the compromised system. The cross-platform nature of CrossRAT enables attackers to target a wide range of victims regardless of their operating system.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor process creation events for the execution of <code>java -jar</code> from unusual locations, as this is a common method for launching CrossRAT (see rule: &ldquo;Detect CrossRAT Execution via Java&rdquo;).</li>
<li>Monitor the creation of new Launch Agents in <code>/Library/LaunchAgents/</code> or <code>/Users/&lt;user&gt;/Library/LaunchAgents/</code> directories on macOS, specifically those executing JAR files (see rule: &ldquo;Detect CrossRAT macOS Persistence&rdquo;).</li>
<li>Inspect network connections originating from Java processes for suspicious command and control traffic.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>crossrat</category><category>rat</category><category>persistence</category><category>surveillanceware</category></item></channel></rss>