New RUSTBUCKET Malware With Zero Detections on VirusTotal

by Esmeralda McKenzie
New RUSTBUCKET Malware With Zero Detections on VirusTotal

New RUSTBUCKET Malware With Zero Detections on VirusTotal

Fresh RUSTBUCKET Malware

The DPRK campaign is utilizing a no longer too lengthy within the past up up to now version of Rustbucket malware to preserve some distance off from being detected.

This variant of RUSTBUCKET, targets macOS systems, adds persistence capabilities no longer previously noticed and, at the time of reporting, is undetected by VirusTotal signature engines.

The Elastic Security Labs crew has detected a brand unusual variant of the RUSTBUCKET malware, a family that has been previously attributed to the BlueNorOff community by Jamf Threat Labs in April 2023.

The DPRK conducts malicious cyber activities and deploys data technology (IT) workers who fraudulently compose employment to generate income.

RUSTBUCKET Malware Infection Chain

As per the evaluate RUSTBUCKET family of malware is beneath crammed with life pattern. Additionally, at the time of newsletter, this unusual variant has zero detections on VirusTotal and is leveraging a dynamic community infrastructure methodology for recount and alter.

The recount /usr/bin/osascript has been extinct to enact the AppleScript which is accountable for downloading  Stage 2 binary from the C2 utilizing cURL.

This session contains the string pd within the physique of the HTTP inquire of of and cur1-agent as the Person-Agent string which saves the Stage 2 binary to /customers/shared/.pd,

The Stage 2 binary (.pd) is compiled in Swift and operates primarily based totally on recount-line arguments. The binary expects a C2 URL to be equipped as the first parameter when performed.

Upon execution, it invokes the downAndExec purpose, which is accountable for preparing a POST HTTP inquire of of.

To galvanize this inquire of of, the binary sets the Person-Agent string as mozilla/4.0 (like minded; msie 8.0; residence windows nt 5.1; trident/4.0) and contains the string pw within the physique of the HTTP inquire of of.

Throughout execution, the malware utilizes particular macOS APIs for different operations. It begins with NSFileManager’s temporaryDirectory purpose to compose the fresh non permanent folder, then generates a random UUID utilizing NSUUID’s UUID.init system.

Within the wreck, the malware combines the non permanent itemizing direction with the generated UUID to create a unusual file region and writes the payload to it.

As soon as the payload is written to disk, the malware utilizes NSTask to galvanize its execution.

Gathers Plot Recordsdata

The malware initiates its operations by dynamically generating a 16-byte random value at runtime. This value serves as a particular identifier for the teach instance of the crammed with life malware. Therefore, the malware proceeds to amass comprehensive intention data, alongside side:

  • Computer title
  • List of crammed with life processes
  • Fresh timestamp
  • Set up timestamp
  • Plot boot time
  • Space of all running processes inside of the intention

The malware establishes its preliminary connection to the C2 server by transmitting the gathered data through a POST inquire of of. The inquire of of is accompanied by a Person-Agent string formatted as Mozilla/4.0 (like minded; MSIE 8.0; Windows NT 5.1; Trident/4.0).

Upon receiving the inquire of of, the C2 server responds with a recount ID, which serves as an instruction for the malware. The malware is designed to handle only two commands.

Present ID 0x31-to self-discontinuance

Present ID 0x30-This recount permits the operator to upload malicious Mach-O binaries or shell scripts to the intention and enact them.

The malware proceeds by granting execution permissions to the uploaded file utilizing the chmod API.After executing the payload, the malware sends a dwelling update to the server, notifying it of the carried out execution, after which sleeps for 60 seconds.

Following this lengthen, the malware loops to gather intention data all over but again and remains in a waiting tell, waiting for the advent of the next recount from the server.

The multi-stage composition of the malware, moreover to the utilization of Rust programming language and the focused on of macOS, fabricate detection and prevention a vital anxiety.

Indicator of compromise:

9ca914b1cfa8c0ba021b9e00bda71f36cad132f27cf16bda6d937badee66c747
7fccc871c889a4f4c13a977fdd5f062d6de23c3ffd27e72661c986fae6370387
ec8f97d5595d92ec678ffbf5ae1f60ce90e620088927f751c76935c46aa7dc41
de81e5246978775a45f3dbda43e2716aaa1b1c4399fe7d44f918fccecc4dd500
4f49514ab1794177a61c50c63b93b903c46f9b914c32ebe9c96aa3cbc1f99b16
fe8c0e881593cc3dfa7a66e314b12b322053c67cbc9b606d5a2c0a12f097ef69
7887638bcafd57e2896c7c16698e927ce92fd7d409aae698d33cdca3ce8d25b8

Source credit : cybersecuritynews.com

Related Posts