• Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Transform
      • SOC Consultancy
      •     SOC Maturity Assessment
      •     SOC Model Evaluation
      •     SOC Gap Analysis
      •     SIEM Gap Analysis
      •     SIEM Optimization
      •     SOC Content Pack
    • Train
      • Security Awareness and Training
      • Tabletop Exercise
      • Simulated Cyber Attack Exercises
    • Respond
      • Incident Response
      • Incident Analysis
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
Rewterz Threat Advisory – Flexera FlexNet Publisher Memory Corruption Vulnerabilities
November 21, 2019
Rewterz Threat Advisory – Multiple Vulnerabilities in Google Chrome Could Allow for Arbitrary Code Execution
November 21, 2019

Rewterz Threat Alert – Mac Backdoor Nukesped Linked to Lazarus Group

November 21, 2019

Severity

Medium

Analysis Summary

Attributed to the cyber criminal group Lazarus, a Mac backdoor Nukesped is seen being delivered to Korean targets via a macro-embedded Microsoft Excel spreadsheet. The macro in this file will just run a PowerShell script that connects to three C&C servers set up by the group. The actual Adobe Flash Player is contained as a hidden Mach-O file. The bundle contains two Flash Player files: a legitimate version and a malicious version (Trojan.MacOS.NUKESPED.B). The app will run the smaller-sized Flash Player as its main executable, which is the malicious version that only poses as a “Flash Player” by name. It also runs the legitimate Flash Player to hide its actual malicious routine. When running the Mac app, the malicious Flash Player will run the legitimate one to play a decoy SWF video. WUhile the video is playing, the malicious Flash Player creates another hidden file (Backdoor.MacOS.NUKESPED.A) in the following path: ~/.FlashUpdateCheck.

Subsequently, a persistence mechanism for this hidden file is installed through dropped PLIST file ~/Library/Launchagents/com.adobe.macromedia.plist.

Further inspection shows that the hidden file ~/.FlashUpdateCheck acts as the dropped Powershell script-equivalent of the Macro-embedded document. This attack type uses an app with a decoy while running the malicious routine to separate the entire Mac attack chain.

Impact

  • Unauthorized Remote Access
  • Data Manipulation
  • Data exfiltration

Indicators of Compromise

Domain Name

craypot[.]live

MD5

  • a8096ddf8758a79fdf68753190c6216a
  • 601b672f7139615f925a2eec792aa9d5
  • bac54e7199bd85afa5493e36d3f193d2

SHA-256

  • d91c233b2f1177357387c29d92bd3f29fab7b90760e59a893a0f447ef2cb4715
  • 735365ef9aa6cca946cfef9a4b85f68e7f9f03011da0cf5f5ab517a381e40d02
  • 6f7a5f1d52d3bfc6f175bf2bbb665e4bd99b0453e2d2e27712fe9b71c55962dc

SHA1

  • 5955837b6f888a733e05cbb444279d24f5313ac5
  • 0b12e7f03248f8ecef86ce2c6f75d2d30555608c
  • 428f1ef151ef6b60e345a5cb72204f32c34745b4

Remediation

  • Block the threat indicators at their respective controls.
  • Only download apps from official sources.
  • Do not download files attached in untrusted emails and do not enable macros for the
  • Services
    • Asses
      • Compromise Assessment
      • APT Assessment
      • Penetration Testing
      • Secure Architecture Design & Review
      • Red Team Assessment
      • Purple Team Assessment
      • Social Engineering
      • Source Code Review
    • Respond
      • Incident Response
      • Incident Analysis
  • Transform
    • SOC Consultancy
    •     SOC Maturity Assessment
    •     SOC Model Evaluation
    •     SOC Gap Analysis
    •     SIEM Gap Analysis
    •     SIEM Optimization
    •     SOC Content Pack
  • Train
    • Security Awareness and Training
    • Tabletop Exercise
    • Simulated Cyber Attack Exercises
  • Managed Security
    • Managed Security Monitoring
      • Remote SOC
      • Onsite SOC
      • Hybrid SOC
    • Managed Security Services
      • Managed Detection and Response
      • Managed Endpoint Detection and Response
      • Managed Threat Intelligence
      • Managed Threat Hunting
      • Managed Risk-Based SOAR
      • Managed Penetration Testing
  • Solutions
  • Resources
    • Blog
    • Threat Advisory
  • Company
    • About Us
    • Careers
    • Contact
COPYRIGHT © REWTERZ. ALL RIGHTS RESERVED.