

Rewterz Threat Advisory – Flexera FlexNet Publisher Memory Corruption Vulnerabilities
November 21, 2019
Rewterz Threat Advisory – Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
November 21, 2019
Rewterz Threat Advisory – Flexera FlexNet Publisher Memory Corruption Vulnerabilities
November 21, 2019
Rewterz Threat Advisory – Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
November 21, 2019Severity
Medium
Analysis Summary
Attributed to the cyber criminal group Lazarus, a Mac backdoor Nukesped is seen being delivered to Korean targets via a macro-embedded Microsoft Excel spreadsheet. The macro in this file will just run a PowerShell script that connects to three C&C servers set up by the group. The actual Adobe Flash Player is contained as a hidden Mach-O file. The bundle contains two Flash Player files: a legitimate version and a malicious version (Trojan.MacOS.NUKESPED.B). The app will run the smaller-sized Flash Player as its main executable, which is the malicious version that only poses as a “Flash Player” by name. It also runs the legitimate Flash Player to hide its actual malicious routine. When running the Mac app, the malicious Flash Player will run the legitimate one to play a decoy SWF video. WUhile the video is playing, the malicious Flash Player creates another hidden file (Backdoor.MacOS.NUKESPED.A) in the following path: ~/.FlashUpdateCheck.
Subsequently, a persistence mechanism for this hidden file is installed through dropped PLIST file ~/Library/Launchagents/com.adobe.macromedia.plist.
Further inspection shows that the hidden file ~/.FlashUpdateCheck acts as the dropped Powershell script-equivalent of the Macro-embedded document. This attack type uses an app with a decoy while running the malicious routine to separate the entire Mac attack chain.
Impact
- Unauthorized Remote Access
- Data Manipulation
- Data exfiltration
Indicators of Compromise
Domain Name
craypot[.]live
MD5
- a8096ddf8758a79fdf68753190c6216a
- 601b672f7139615f925a2eec792aa9d5
- bac54e7199bd85afa5493e36d3f193d2
SHA-256
- d91c233b2f1177357387c29d92bd3f29fab7b90760e59a893a0f447ef2cb4715
- 735365ef9aa6cca946cfef9a4b85f68e7f9f03011da0cf5f5ab517a381e40d02
- 6f7a5f1d52d3bfc6f175bf2bbb665e4bd99b0453e2d2e27712fe9b71c55962dc
SHA1
- 5955837b6f888a733e05cbb444279d24f5313ac5
- 0b12e7f03248f8ecef86ce2c6f75d2d30555608c
- 428f1ef151ef6b60e345a5cb72204f32c34745b4
Remediation
- Block the threat indicators at their respective controls.
- Only download apps from official sources.
- Do not download files attached in untrusted emails and do not enable macros for the