Nothing but a generic icon | xxxNothing but a generic icon – xxx
菜单

Nothing but a generic icon

十二月 13, 2018 - BleepingComputer

Nothing but a generic icon

The world of macOS malware has a new member that makes no effort to keep appearances and looks rather like a bare-bones version that is still under development.

Its functionality is limited to taking screenshots and running a backdoor. This, coupled with the lack of a proper facade earned it the name of OSX.LamePyre.

Disguised as a copy of the Discord messaging app for gamers, the malware was discovered last Friday by Malwarebytes’ threat researcher Adam Thomas, who noticed that the guise did not go beyond the initial concealment.

He says that “this copy of Discord didn’t seem to do anything, because it was actually an Automator script that did nothing for the user.”

Nothing but a generic icon

When LamePyre runs on the system, users see the generic Automator icon in the menu bar, which is typical for any script of this sort.

The script decodes a payload written in Python and runs it on the victim host. It then starts to take pictures and upload them to the attacker’s command and control (C2) server.

Nothing but a generic icon
LamePyre Automator script that decodes the Python payload

Thomas noticed that one part of the Python code was written to set up the open source EmPyre backdoor on the system. This particular backdoor has been seen with another malware strain for macOS, DarthMiner, which integrated cryptocurrency mining capabilities.

LamePyre seems either like a poor job or a threat under development as it does not include functionality that would allow it to pass as a legitimate Discord messenger.

“It is not a maliciously-modified copy of the Discord app. It doesn’t even include and launch a copy of the Discord app, which it could do easily as a subterfuge to make the app look legit. For that matter, it doesn’t even use a convincing icon!” Malwarebytes says.

To keep the malicious code running, the author included code that sets up a launch agent with the deceptive name ‘com.apple.systemkeeper.plist.’

Given the behavior of the malware, chances are users won’t realize that something is out of place soon enough and LamePyre would have already opened the backdoor and delivered some screenshots to the attacker.

December, the month of macOS malware

This month has seen plenty of activity on the macOS malware front, as two other strains have been discovered.

DarthMiner is one of them, distributed through the Adobe Zii piracy software for pirating multiple applications from Adobe.

In this case, the author made the mistake of using the Adobe Creative Cloud logo instead of the Adobe Zii icon, which attracted well-deserved suspicions.

Another macOS threat is OSX.BadWord, named so by Malwarebytes and discovered by John Lambert, Microsoft Threat Intelligence Center engineer.

This #bitcoin interview lure macro doc does not infect any version of Office for Windows. Why? It is targeting MacOffice.

When you see libc.dylib, system, and plist, you know the macro is up to no good.
▪️https://t.co/fUdSaFFQxq (@patrickwardle)
▪️https://t.co/8NWocQoAAw pic.twitter.com/sSb2dvxmru

— John Lambert (@JohnLaTwC) December 3, 2018

It was delivered via a malicious macro in a Microsoft Word document that exploited a sandbox escape vulnerability to create a launch agent to enable persistence of a Python script that sets up a Meterpreter backdoor to access the system.

As interesting as it seems, OSX.BadWord is not an original creation but a copy-paste job from proof-of-concept code released in February by Adam Chester from MDSec. The difference is in the choice of the backdoor, since Chester mentioned Empire as a possible tool for handling macOS endpoints.

Other than this, the crook put minimum effort into making the malware as they left in the code even the identifiers referring to Chester’s blog; or maybe they just would have felt bad about taking undeserved credit.

Related Articles:

Mac CryptoCurrency Price Tracker Caught Installing Backdoors

Op ‘Sharpshooter’ Uses Lazarus Group Tactics, Techniques, and Procedures

Android Malware Tricks User to Log into PayPal to Steal Funds

WebKit Vulnerability Affects Latest Versions of Apple Safari

Apple Fixes Passcode Bypass, RCE Vulnerabilities, and More in Today’s Updates.

Forum Rules and Posting Guidelines

Bleeping Computer® is a community of individuals of all ages who are here to learn new information, to help each other, and to help their fellow peers. With that in mind, we ask that all members please follow these simple rules in order to create an atmosphere where everyone feels comfortable.

The rules are as follows:

Violation of any of these rules can lead to a banning of the user from our Web Site and a deletion of their account. The consequences will be determined by the Staff on a case by case basis.

When posting you agree that the administrators and the moderators of this forum have the right to modify, delete, edit or close any topic, signature, account, or profile data at any time that they see fit. If you have any questions concerning this, please do not start a new thread, but rather private message to an administrator or moderator.

contact us


Notice: Undefined variable: canUpdate in /var/www/html/wordpress/wp-content/plugins/wp-autopost-pro/wp-autopost-function.php on line 51