<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Unsigned_binary — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/unsigned_binary/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 02 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/unsigned_binary/feed.xml" rel="self" type="application/rss+xml"/><item><title>macOS DNS Request for IP Lookup Service via Unsigned Binary</title><link>https://feed.craftedsignal.io/briefs/2024-01-macos-unsigned-ip-lookup/</link><pubDate>Tue, 02 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-macos-unsigned-ip-lookup/</guid><description>An unsigned or untrusted binary on macOS is performing DNS requests for IP lookup services to determine the system's external IP address, which is commonly used by malware for reconnaissance before establishing C2 connections.</description><content:encoded><![CDATA[<p>This activity detects when a DNS request is made for an IP lookup service to determine the external IP address of a macOS system via an unsigned or untrusted binary. This technique is frequently employed by malware for reconnaissance purposes prior to establishing command and control (C2) communications. The detection focuses on identifying DNS queries from processes lacking valid code signatures, which can indicate the presence of malicious or suspicious software. A typical pattern involves an unsigned Mach-O or script resolving domains like api.ipify.org or ipinfo.io immediately after execution, followed by outbound beacons. This activity is important to detect as it is an early stage indicator of compromise, allowing defenders to disrupt potential malware before further malicious actions can be performed.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>A malicious or unwanted application is executed on a macOS system, often without a valid code signature or trusted signature.</li>
<li>The application attempts to determine the system&rsquo;s external IP address to potentially tailor further actions.</li>
<li>To discover the external IP, the application performs a DNS lookup for a known IP lookup service domain (e.g., api.ipify.org, ipinfo.io).</li>
<li>The DNS query is resolved, providing the application with the system&rsquo;s external IP address.</li>
<li>The application may then use the IP address to determine the system&rsquo;s geolocation or other network-related information.</li>
<li>Based on the gathered information, the application may select a command and control (C2) server or adjust its behavior.</li>
<li>The application initiates a connection to the selected C2 server, potentially downloading further malicious payloads or receiving instructions.</li>
<li>Finally, malware establishes C2 communication and starts exfiltrating data or performing other malicious actions.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Compromised systems can lead to data exfiltration, unauthorized access, and further propagation of malware within the network. Successful reconnaissance allows attackers to tailor their attacks, potentially evading detection and maximizing impact. While the severity is medium, early detection of this activity is crucial to prevent more significant damage. The absence of a valid code signature increases the likelihood of the process being malicious.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rule &ldquo;Detect DNS Request for IP Lookup Service via Unsigned Binary&rdquo; to your SIEM and tune for your environment to detect unsigned binaries querying for IP lookup services.</li>
<li>Investigate any alerts generated by the Sigma rule, focusing on the process&rsquo;s origin, parent processes, and subsequent network activity.</li>
<li>Block the observed IP-lookup domains listed in the IOC table at the DNS resolver to prevent further reconnaissance.</li>
<li>Isolate affected macOS hosts from the network if unsigned processes continue to resolve IP-lookup domains or initiate new outbound connections.</li>
<li>Acquire and analyze any unsigned binaries identified by the detection rule to confirm intent and scope of compromise.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>discovery</category><category>macos</category><category>dns</category><category>reconnaissance</category><category>unsigned_binary</category></item></channel></rss>