{"id":12363,"date":"2018-05-22T08:10:01","date_gmt":"2018-05-22T16:10:01","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/05\/22\/news-6132\/"},"modified":"2018-05-22T08:10:01","modified_gmt":"2018-05-22T16:10:01","slug":"news-6132","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/05\/22\/news-6132\/","title":{"rendered":"New Mac cryptominer uses XMRig"},"content":{"rendered":"<p><strong>Credit to Author: Thomas Reed| Date: Tue, 22 May 2018 15:00:00 +0000<\/strong><\/p>\n<p>A new Mac cryptominer was discovered this week, after affected users saw their fans whirring out of control and a process named &#8220;mshelper&#8221; gobbling up CPU time like Cookie Monster. Fortunately, this malware is not very sophisticated and is easy to remove.<\/p>\n<p>The malware became public knowledge in a post on <a href=\"https:\/\/discussions.apple.com\/thread\/8392063\" target=\"_blank\" rel=\"noopener\">Apple&#8217;s discussion forums<\/a>, where the &#8220;mshelper&#8221; process was found to be the culprit. Digging deeper, it was discovered that there were a couple other suspicious processes installed as well. We went searching and found copies of these files.<\/p>\n<p>The malware is mining for Monero cryptocurrency. Here&#8217;s a breakdown of its components.<\/p>\n<h3>The dropper<\/h3>\n<p>A &#8220;dropper&#8221; is what security researchers call the program that installs malware. Often, Mac malware is installed by things like fake Adobe Flash Player installers, downloads from piracy sites, decoy documents users are tricked into opening, and other such things.<\/p>\n<p>In this case, the dropper is still unknown, but we do not believe it&#8217;s anything sophisticated. Everything else about this malware suggests simplicity.<\/p>\n<h3>The launcher<\/h3>\n<p>A file named <em>pplauncher<\/em> is installed in the following location:<\/p>\n<pre>~\/Library\/Application Support\/pplauncher\/pplauncher<\/pre>\n<p>This file is kept running by a launch daemon (<em>com.pplauncher.plist<\/em>), indicating that the dropper must have had root privileges.<\/p>\n<p><em>pplauncher<\/em> is a rather large executable file (3.5 MB) that was written in Golang and then compiled for macOS. The sole responsibility of this process appears to be the fairly simple process of installing and launching the miner process.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/pplauncher.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"23864\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/mac-threat-analysis\/2018\/05\/new-mac-cryptominer-uses-xmrig\/attachment\/pplauncher\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/pplauncher.png\" data-orig-size=\"718,982\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"pplauncher\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/pplauncher-219x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/pplauncher-439x600.png\" class=\"aligncenter size-large wp-image-23864\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/pplauncher-439x600.png\" alt=\"\" width=\"439\" height=\"600\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/pplauncher-439x600.png 439w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/pplauncher-219x300.png 219w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/pplauncher.png 718w\" sizes=\"auto, (max-width: 439px) 100vw, 439px\" \/><\/a><\/p>\n<p>Using Golang introduces significant overhead, resulting in a binary file containing more than 23,000 functions. Using this for what appears to be simple functionality is probably a sign that the person who created it is not particularly familiar with Macs.<\/p>\n<pre>pplauncher SHA256:  8f1938d082393713539abb9dfa8bfde8e1a09721f622e6e597d4560219ffca0d<\/pre>\n<h3>The miner<\/h3>\n<p>The miner is the <em>mshelper<\/em> process, which is installed here:<\/p>\n<pre>\/tmp\/mshelper\/mshelper<\/pre>\n<p>This process appears to be an older version of the legitimate XMRig miner, which can be installed on Macs via Homebrew. Getting the version information from the current XMRig gives the following results:<\/p>\n<pre>$ xmrig -V  XMRig 2.6.2  <span class=\"Apple-converted-space\">\u00a0<\/span>built on May<span class=\"Apple-converted-space\">\u00a0 <\/span>7 2018 with clang 9.0.0 (clang-900.0.39.2)  <span class=\"Apple-converted-space\">\u00a0<\/span>features: 64-bit AES<\/pre>\n<p>Requesting the same information from the <em>mshelper<\/em> process gives the following results:<\/p>\n<pre>$ \/tmp\/mshelper\/mshelper -V  XMRig 2.5.1  <span class=\"Apple-converted-space\">\u00a0<\/span>built on Mar 26 2018 with clang 9.0.0 (clang-900.0.39.2)  <span class=\"Apple-converted-space\">\u00a0<\/span>features: x86_64 AES-NI<\/pre>\n<p>Clearly, <em>mshelper<\/em> is simply an older copy of XMRig that is being used for the purpose of generating the cryptocurrency for the hacker behind the malware. The <em>pplauncher<\/em> process provides the necessary command-line arguments, such as the following parameter specifying the user, found using the <em>strings<\/em> command on the <em>pplauncher<\/em> executable file:<\/p>\n<pre>--user=19531259765625<\/pre>\n<pre>mshelper SHA256:  a00f6fbb2e00d35f938534e1c20ba2e02311536bcf60be2165037d68cba141b2<\/pre>\n<h3>Mac cryptomining on the rise<\/h3>\n<p>This malware is not particularly dangerous, unless your Mac has a problem like damaged fans or dust-clogged vents that could cause overheating. Although the mshelper process is actually a legitimate piece of software being abused, it should still be removed along with the rest of the malware.<\/p>\n<p>Mac cryptomining malware has been on the rise recently, just as in the Windows world. This malware follows other cryptominers for macOS, such as Pwnet, CpuMeaner, and CreativeUpdate. I&#8217;d rather be infected with a cryptominer than some other kind of malware, but that doesn&#8217;t make it a good thing.<\/p>\n<p>If you think you&#8217;re infected with this malware, <a href=\"https:\/\/malwarebytes.com\/mac\" target=\"_blank\" rel=\"noopener\">Malwarebytes for Mac<\/a> will remove it. We detect this malware as OSX.ppminer.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/mac-threat-analysis\/2018\/05\/new-mac-cryptominer-uses-xmrig\/\">New Mac cryptominer uses XMRig<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/mac-threat-analysis\/2018\/05\/new-mac-cryptominer-uses-xmrig\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Thomas Reed| Date: Tue, 22 May 2018 15:00:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/mac-threat-analysis\/2018\/05\/new-mac-cryptominer-uses-xmrig\/' title='New Mac cryptominer uses XMRig'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/05\/shutterstock_1073435144.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>New Mac cryptominer malware is using the XMRig library to mine Monero on infected Macs.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/mac-threat-analysis\/\" rel=\"category tag\">Mac<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/apple\/\" rel=\"tag\">Apple<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cryptominer\/\" rel=\"tag\">cryptominer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cryptomining\/\" rel=\"tag\">cryptomining<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mac\/\" rel=\"tag\">mac<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mac-cryptominer\/\" rel=\"tag\">Mac cryptominer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/xmrig\/\" rel=\"tag\">XMRig<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/mac-threat-analysis\/2018\/05\/new-mac-cryptominer-uses-xmrig\/' title='New Mac cryptominer uses XMRig'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/mac-threat-analysis\/2018\/05\/new-mac-cryptominer-uses-xmrig\/\">New Mac cryptominer uses XMRig<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[2211,15079,15080,10454,17451,10494,18493],"class_list":["post-12363","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-apple","tag-cryptominer","tag-cryptomining","tag-mac","tag-mac-cryptominer","tag-threat-analysis","tag-xmrig"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12363","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=12363"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/12363\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=12363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=12363"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=12363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}