nerdsniper
4 months ago
The binary itself appears to be a remote-access trojan and data exfiltration malware for MacOS. It provides a reverse-shell via http://83.219.248.194 and exfiltrates files with the following extensions: txt rtf doc docx xls xlsx key wallet jpg dat pdf pem asc ppk rdp sql ovpn kdbx conf json It looks quite similar to AMOS - Atomic MacOS Stealer.
It also seems to exfiltrate browser session data + cookies, the MacOS keychain database, and all your notes in MacOS Notes.
It's moderately obfuscated, mostly using XOR cipher to obscure data both inside the binary (like that IP address for the C2 server) and also data sent to/from the C2 server.
didgeoridoo
4 months ago
I can’t even exfiltrate my MacOS Notes on purpose. Maybe I’ll download it and give it a spin.
tecoholic
4 months ago
God! That cracked me up. :D
alsetmusic
3 months ago
I've had great success exporting using the Shortcuts app pretty recently. Do a web search for the relevant terms and you'll find examples.
piskov
4 months ago
It now supports markdown export in latest macos
gus_
4 months ago
nowadays, restricting outgoing connections initiated by unknown binaries should be a must. Specially if it's launched from /tmp
Lulu or Little Snitch should have warned the user and stopped the exfiltration of data.