WSHRAT aka Houdini – Active IOCs
May 7, 2024LockBit Ransomware – Active IOCs
May 8, 2024WSHRAT aka Houdini – Active IOCs
May 7, 2024LockBit Ransomware – Active IOCs
May 8, 2024Severity
High
Analysis Summary
A novel information stealer that targets Apple macOS has been found by cybersecurity researchers. It is intended to become persistent on compromised hosts and function as malware. The malware, known as Cuckoo, is a universal Mach-O program that can operate on Macs with Intel or Arm processors.
Although there are hints that the file is hosted on websites purporting to provide both free and paid versions of programs designed to extract music from streaming services and convert it to the MP3 format, the precise distribution vector is yet unknown. A bash shell is launched by the disk image file that was downloaded from the websites to obtain host information and confirm that the compromised system is not in Armenia, Belarus, Kazakhstan, Russia, or Ukraine. Only when the locale check is successful is the malicious binary run.
Additionally, it achieves persistence through a LaunchAgent—a tactic previously employed by other malware families, including ZuRu-overlapping macOS backdoors, XLoader, RustBucket, and JaskaGO. Similar to the MacStealer macOS stealer malware, Cuckoo uses osascript to display a phony password prompt and fool users into entering their credentials to escalate their privileges.
This malware searches for specific files linked to particular applications to obtain as much data as it can from the system. It can execute several commands to gather data from iCloud Keychain, Apple Notes, web browsers, cryptocurrency wallets, and applications like Discord, FileZilla, Steam, and Telegram. It can also gather hardware information, take screenshots, record processes that are presently running, and search for installed programs.
“Each malicious application contains another application bundle within the resource directory,” said the researchers.
The revelation follows the discovery of another stealer software, called CloudChat, by the Apple device management firm over a month ago. This malware can trick macOS users whose IP addresses do not geolocate to China by posing as a private messaging program. The malware obtains information linked to Google Chrome wallet extensions and crypto private keys that have been copied to the clipboard.
Impact
- Cyber Espionage
- Credential Theft
- Privilege Escalation
- Sensitive Information Theft
Indicators of Compromise
MD5
- 0b3880f945a305f9bbb4aa2f6acaabf6
- d66c04ef314b3a43f011f681324b256c
- 269b193738b0eca54147338211719478
- ad0dc84634906434e571681d901056d3
- 116215690d7a5bdffe0ac911a36fb765
SHA-256
- 254663d6f4968b220795e0742284f9a846f995ba66590d97562e8f19049ffd4b
- 1827db474aa94870aafdd63bdc25d61799c2f405ef94e88432e8e212dfa51ac7
- d8c3c7eedd41b35a9a30a99727b9e0b47e652b8f601b58e2c20e2a7d30ce14a8
- 39f1224d7d71100f86651012c87c181a545b0a1606edc49131730f8c5b56bdb7
- a709dacc4d741926a7f04cad40a22adfc12dd7406f016dd668dd98725686a2dc
SHA1
- a700b0759351fd912cf8155579ea21f21437f075
- c5c8335ed343d14d2150a9ba90e182ca739bde8a
- 1ef1f94d39931b6e625167b021a718f3cfe6bb80
- 2cdda89c50c2aa1eb4b828350b7086748c58fe08
- e9180ee202c42e2b94689c7e3fb2532dd5179fad
URL
- http://146.70.80.123/static.php
- http://146.70.80.123/index.php
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Be vigilant when downloading software and double-check the URL to see if it is legitimate.
- Never download software from untrusted sources.
- Do not download documents attached in emails from unknown sources and strictly refrain from enabling macros when the source isn’t reliable.
- Enable antivirus and anti-malware software and update signature definitions on time. Using multi-layered protection is necessary to secure vulnerable assets.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Develop and regularly update an incident response plan that outlines the steps to take in case of a security breach. Test the plan through simulations to ensure its effectiveness.