<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Trojan — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/trojan/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/trojan/feed.xml" rel="self" type="application/rss+xml"/><item><title>Lazarus Group's macOS 'Fileless' Implant</title><link>https://feed.craftedsignal.io/briefs/2024-01-lazarus-fileless-macos/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-lazarus-fileless-macos/</guid><description>The Lazarus APT group is distributing a trojanized macOS application named UnionCryptoTrader.dmg that installs a launch daemon for persistence, downloads and executes secondary payloads in-memory, and communicates with the command and control server unioncrypto.vip.</description><content:encoded><![CDATA[<p>The Lazarus Group, known for targeting cryptocurrency exchanges, continues to evolve its macOS capabilities. This campaign, observed in late 2019, involves a trojanized application named UnionCryptoTrader.dmg, masquerading as a legitimate cryptocurrency trading platform. The application, hosted on the domain unioncrypto.vip (104.168.167.16), is delivered to victims via an assumed download link. Once executed, the application installs a persistent launch daemon and then downloads and executes further payloads directly in memory, minimizing its footprint on the compromised system. This &lsquo;fileless&rsquo; approach, combined with targeting of cryptocurrency platforms, demonstrates Lazarus Group&rsquo;s ongoing interest in financial gain and their increasing sophistication in macOS malware development.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The victim downloads a disk image (UnionCryptoTrader.dmg) from unioncrypto.vip.</li>
<li>The victim mounts the DMG, revealing an unsigned package installer (UnionCryptoTrader.pkg).</li>
<li>The victim executes the package, which prompts for administrator credentials due to the installation of a launch daemon.</li>
<li>The postinstall script within the package moves a hidden plist file (.vip.unioncrypto.plist) to <code>/Library/LaunchDaemons/vip.unioncrypto.plist</code> for persistence.</li>
<li>The script also moves a hidden executable (.unioncryptoupdater) to <code>/Library/UnionCrypto/unioncryptoupdater</code> and sets its permissions to executable.</li>
<li>The launch daemon (<code>/Library/UnionCrypto/unioncryptoupdater</code>) is executed and configured to run on each system reboot.</li>
<li>The <code>unioncryptoupdater</code> binary gathers system information, including the serial number using IOKit (<code>IOPlatformSerialNumber</code>).</li>
<li>The <code>unioncryptoupdater</code> binary connects to the C2 server <code>unioncrypto.vip/update</code> to download and execute payloads in memory.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>This attack targets employees of cryptocurrency exchanges. Successful infection allows the Lazarus Group to gain persistent access to systems within these organizations, potentially leading to theft of cryptocurrency, sensitive financial data, or disruption of trading operations. The fileless nature of the secondary payload execution makes detection more difficult, increasing the attacker&rsquo;s dwell time and potential for damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for the creation of launch daemons by unsigned installers, specifically those moving plist files to <code>/Library/LaunchDaemons</code> (see attack chain steps 4-5).</li>
<li>Monitor network connections to <code>unioncrypto.vip</code> from unusual processes or those located in <code>/Library/UnionCrypto</code> using the provided IOCs.</li>
<li>Deploy the Sigma rule &ldquo;Detect UnionCryptoTrader Package Installation&rdquo; to identify the execution of the malicious installer.</li>
<li>Block the domain <code>unioncrypto.vip</code> at the network perimeter (DNS or firewall) to prevent initial infection and C2 communication using the provided IOC.</li>
<li>Enable endpoint detection and response (EDR) systems to detect and block the execution of unsigned binaries from <code>/Library/UnionCrypto</code>.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>lazarus</category><category>fileless</category><category>macos</category><category>trojan</category></item></channel></rss>