Originally published at: Gimmick MacOS Malware Spreads Through Customized Files, Enables MacOS CodeSign Bypass - CloudSEK
Gimmick MacOS Malware Spreads Through Customized Files, Enables MacOS CodeSign Bypass
Category:
Malware Intelligence |
Threat Type: Malware |
Motivation:
Financial |
Region:
Global |
Source*:
F6 |
---|
Summary – Gimmick MacOS Malware
THREAT | IMPACT | MITIGATION |
---|---|---|
|
|
|
CloudSEK’s contextual AI digital risk platform XVigil identified a malware called Gimmick and its chances of further exploitation by cyber criminals. The malware was discovered in the first week of May and it has been actively targeting MacOS devices. Based on underground discussions, CloudSEK researchers expect this malicious software to ramp up infection attempts.
Analysis and Attribution
Information from OSINT
- Gimmick malware is being heavily attributed to a Chinese cyber espionage group named Storm Cloud that has a history of targeting Asian regions.
- Based on various resources, CloudSEK researchers discovered that Gimmick MacOS malware communicates only through their C2 server hosted on Google Drive. The first sample submission of this malware was reported to be around March.
- This malware is distributed as a CorelDraw file that weighs 713.77 KB: ‘2a9296ac999e78f6c0bee8aca8bfa4d4638aa30d9c8ccc65124b1cbfc9caab5f.mlwr’
- This CorelDraw file sample is a Mach-O type file. Mach-O, short for Mach object file format, is a file format for executables, object code, shared libraries, dynamically-loaded code, and core dumps.
- Based on this observation, CloudSEK researchers identified various techniques used by threat actors to bypass the Mach-O restrictions.
- Threat actors can also amplify the spread of this malware using these techniques.
Cybercrime Forum Analysis
- Along with the Gimmick MacOS malware, CloudSEK threat intelligence researchers also discovered a threat actor selling a method that can execute a Mach-O file on any machine across all versions of MacOS, without the need of CodeSigning the binary.
- The actor claims that this method effectively removes the “com.apple.quarantine” attribute from the binary, enabling the execution of the code on any machine outside their own.
- The threat actor mentions that this method only applies to MacOS devices, and not IOS.
- The actor has also advertised their loader malware on the cybercrime forum and is actively searching for a partner to spread it.
Indicators of Compromise (IOCs)
Based on VirusTotal and Triage scan results, given below is a list of IOCs for Gimmick MacOS malware:
MD5 |
---|
23699799f496b8e872d05f19d2b397f8 |
SHA-1 |
fe3a3e65b86d2b07654f9a6104c8cb392c88b7e8 |
SHA-256 |
2a9296ac999e78f6c0bee8aca8bfa4d4638aa30d9c8ccc65124b1cbfc9caab5f |
Impact & Mitigation
Impact | Mitigation |
---|---|
|
|