Falcon Platform Prevents COOKIE SPIDER’s SHAMOS Delivery on macOS

Assessment

This campaign highlights that leveraging malvertising and the one-line installation-command technique to distribute macOS information stealers remains popular among eCrime actors. Promoting false malicious websites encourages more site traffic, which will lead to more potential victims. The one-line installation command enables eCrime actors to directly install the Mach-O executable onto the victim’s machine while bypassing Gatekeeper checks.

CrowdStrike Counter Adversary Operations assesses that eCrime actors will likely continue to leverage both malvertising and one-line installation commands to distribute macOS information stealers. This assessment is made with high confidence, as the combination has historically been successful, and these methods allow actors to bypass Gatekeeper checks.

Recommended Prevention Settings

To protect endpoints from this threat, CrowdStrike Falcon® Insight XDR customers should ensure the following prevention policy settings are configured:

  • Suspicious process prevention
  • Intelligence-sourced threat prevention

Threat Hunting Queries 

The following CrowdStrike Falcon® Next-Gen SIEM Advanced Event Search queries are provided to assist defenders in hunting for this and similar activity across their endpoints.

NOTE: Make sure to update the Falcon URL to the cloud in which your environment is currently configured (US1, US2, EU, etc.)

“Bash script execution with calls to risky LOOBINs”

event_platform=Mac #event_simpleName=ScriptControlScanInfo ScriptContent="*dscl*curl*xattr*chmod*"
| format("[GraphExplorer](https://falcon.crowdstrike.com/graphs/process-explorer/tree?id=pid:%s:%s)", field=["aid", "TargetProcessId"], as=GraphExplorer)
| groupBy([aid, GraphExplorer, ScriptContent])

“AppleScript execution under a binary from /tmp/”

event_platform=Mac #event_simpleName=ProcessRollup2 ImageFileName="*/tmp/*"
| join({event_platform=Mac #event_simpleName=ProcessRollup2 ImageFileName="*osascript" CommandLine="*-e*" | rename(field="CommandLine", as="ChildCommandLine") | rename(field="ImageFileName", as="ChildImageFileName")}, field=TargetProcessId, key=ParentProcessId, include=["ChildImageFileName", "ChildCommandLine"], limit=20000)
| format("[GraphExplorer](https://falcon.crowdstrike.com/graphs/process-explorer/tree?id=pid:%s:%s)", field=["aid", "TargetProcessId"], as=GraphExplorer)
| groupBy([aid, GraphExplorer, ImageFileName, CommandLine, ChildImageFileName, ChildCommandLine])

“Curl with commandline indicative of data exfil”

event_platform=Mac #event_simpleName=ProcessRollup2 FileName=curl CommandLine="*POST*out.zip*"
| format("[GraphExplorer](https://falcon.crowdstrike.com/graphs/process-explorer/tree?id=pid:%s:%s)", field=["aid", "TargetProcessId"], as=GraphExplorer)
| groupBy([aid, GraphExplorer, ImageFileName, CommandLine])

Indicators of Compromise (IOCs)

IOC Description
Malvertising websites containing instructions to download SHAMOS

mac-safer[.]com

rescue-mac[.]com

https[:]//github[.]com/jeryrymoore/Iterm2

Bash script SHA256 hashes

231c4bf14c4145be77aa4fef36c208891d818983c520ba067dda62d3bbbf547f

eb7ede285aba687661ad13f22f8555aab186debbadf2c116251cb269e913ef68

SHAMOS Mach-O SHA256 hashes

4549e2599de3011973fde61052a55e5cdb770348876abc82de14c2d99575790f

b01c13969075974f555c8c88023f9abf891f72865ce07efbcee6c2d906d410d5

a4e47fd76dc8ed8e147ea81765edc32ed1e11cff27d138266e3770c7cf953322

95b97a5da68fcb73c98cd9311c56747545db5260122ddf6fae7b152d3d802877

Bash script host URLs

https[:]//icloudservers[.]com/gm/install[.]sh

https[:]//macostutorial[.]com/iterm2/install[.]sh

SHAMOS host URLs

https[:]//icloudservers[.]com/gm/update

https[:]//macostutorial[.]com/iterm2/update

MITRE ATT&CK Framework

The following table maps reported COOKIE SPIDER and SHAMOS tactics, techniques, and procedures (TTPs) to the MITRE ATT&CK® framework.

ID Technique Description
T1583.001 Acquire Infrastructure: Domains The eCrime actor registered fake macOS help websites
T1189 Drive-by Compromise Malvertising distributes websites containing SHAMOS installation instructions
T1204 User Execution SHAMOS requires the user to execute the malicious installer command
T1027.010 Obfuscated Files or Information: Command Obfuscation The malicious command uses Base64-encoding to obfuscate the Bash script download URL
T1105 Ingress Tool Transfer The malicious Bash script downloads SHAMOS from an external URL

Additional Resources

1. The legitimate iTerm2 GitHub repository is located at https[:]//github[.]com/gnachman/iTerm2.

Similar Posts