Analysis by: Karen Ivy Titiwa

ALIASES:

Trojan:MacOS/NukeSped.C!MTB(MICROSOFT); Trojan-Downloader.OSX.Nukesped(IKARUS)

 PLATFORM:

OSX

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 SYSTEM IMPACT RATING:
 INFORMATION EXPOSURE:

  • Threat Type: Trojan

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes

  OVERVIEW

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

As of this writing, the said sites are inaccessible.

  TECHNICAL DETAILS

File Size: 79760 bytes
Memory Resident: Yes
Initial Samples Received Date: 18 Feb 2021

Arrival Details

This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.

Installation

This Trojan drops and executes the following files:

  • This file is usually included in a malicious pkg file that has a postinstall script. This file contains the malicious payload of the pkg.

Autostart Technique

This Trojan drops the following files:

  • /Library/UnionCrypto/unioncryptoupdater (drops malicious file)
  • /Library/LaunchDaemons/vip.unioncrypto.plist
    • Note: “vip.unioncrypto.plist” runs “unioncryptoupdater” using the “RunAtLoad” to run the malicious file every time the system is booted. Unioncryptoupdater and vip.unioncrypto.plist are hidden files in the package file

Download Routine

This Trojan accesses the following websites to download files:

  • https://{BLOCKED}rypto.vip/update → payload

As of this writing, the said sites are inaccessible.

Other Details

This Trojan does the following:

  • Decrypts downloaded payload
  • Tries to copy the decrypted payload into memory and execute the payload
  • If failed to insert payload into memory, saves downloaded to /tmp/updater
  • Will continuously try to repeat the routine every minute

  SOLUTION

Minimum Scan Engine: 10.000
FIRST VSAPI PATTERN FILE: 1.460.00
FIRST VSAPI PATTERN DATE: 04 Dec 2019
VSAPI OPR PATTERN File: 1.460.00
VSAPI OPR PATTERN Date: 28 Jan 2020

Scan your computer with your Trend Micro product to delete files detected as Trojan.MacOS.NUKESPED.YXBBS. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:

NOTES:
Solution: To Remove Malicious File:

  • click launchpad, then type 'activity monitor'
  • once opened, type in the search bar 'unioncryptoupdater'
  • double-click the unioncryptoupdater process, then select quit
  • then select quit at the opened window.
  • click the finder app, in the left select the applications directory, then select the unioncryptotrader app then right-click and select move to trash.
  • in finder app, select go>go to folder. then type \Library
  • search and select the unioncrypt directory, right-click and select move to trash
  • in finder app, select go>go to folder. then type \Library\LaunchDaemons
  • search and select the vip.unioncrypto.plist, right-click and select move to trash
  • Scan your computer with your Trend Micro product to delete files detected as Trojan.MacOS.APPLEJEUS.YEBB-A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files.


Did this description help? Tell us how we did.