

- MAC OSX BUNDLE FILES CODE
- MAC OSX BUNDLE FILES PASSWORD
- MAC OSX BUNDLE FILES ZIP
- MAC OSX BUNDLE FILES DOWNLOAD
MAC OSX BUNDLE FILES DOWNLOAD
CrossRAT can manipulate the file system, take screenshots, download and execute additional files. When executed, the malware will try to copy itself to /usr/var/mediagrs.jar if it has permissions, and in case it fails will copy to %HOME%/Library/mediamgrs.jarThe malware creates LaunchAgent “$HOME/Library/LaunchAgents/ist” for persistence on the infected machine.
MAC OSX BUNDLE FILES CODE
If macros are enabled, a malicious code will be executed to download and infect the system. The infection vector is through a malicious document that arrives in a phishing campaign. There are signs that imply that the malware was developed by/for the Dark Caracal APT group.

The additional downloaded malware will open a reverse shell connection to its Command & Control server. CoinTicker downloads two additional back doors The first is a custom version of EggShell malware and the other is EvilOSX by using the curl command:

However, in the background the malware downloads and executes additional malware from the internet. – Create a LaunchAgent to start itself automatically on system rebootThe malware has also unfinished/unused functionality that includes:- Loading/unloading kernel extensions that handles USB devicesĬoinTicker appears to be a legitimate program that displays information on cryptocurrency coins such as Bitcoin, Etherium, Ripple etc… – Copy itself to “/System/Library/CoreServices/launchb.app” – Enable remote login to the system / Activate Apple Remote Desktop
MAC OSX BUNDLE FILES PASSWORD
– Modify TCC.db to make malware application bundle as “Assistive Access”, means the malware will have accessibility rights without the need for password – Save user name and password into ~/.calisto/cred.dat – Save computer IP address into ~/.calisto/network.dat
MAC OSX BUNDLE FILES ZIP
The malware then will execute a bash command to achieve the following:- Zip ~/Library/Keychains folder into the file ~/.calisto/KC.zip When executed, the malware will pop a window asking for the user’s credentials, to gain root access: Iit can also open a backdoor so the attacker will be able to connect to the system remotely, take screenshots and more.It propagates as fake “Intego Mac Internet Security” as we can see from the differences shown in the pictures below (taken from original report): Calisto is a Trojan that steals sensitive data from the infected machine such as user passwords, Keychain data and Chrome.
