S0274 Calisto
Calisto is a macOS Trojan that opens a backdoor on the compromised machine. Calisto is believed to have first been developed in 2016. 1 2
Item | Value |
---|---|
ID | S0274 |
Associated Names | |
Type | MALWARE |
Version | 1.1 |
Created | 17 October 2018 |
Last Modified | 30 March 2020 |
Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1098 | Account Manipulation | Calisto adds permissions and remote logins to all users.2 |
enterprise | T1560 | Archive Collected Data | - |
enterprise | T1560.001 | Archive via Utility | Calisto uses the zip -r command to compress the data collected on the local system.12 |
enterprise | T1217 | Browser Information Discovery | Calisto collects information on bookmarks from Google Chrome.1 |
enterprise | T1136 | Create Account | - |
enterprise | T1136.001 | Local Account | Calisto has the capability to add its own account to the victim’s machine.2 |
enterprise | T1543 | Create or Modify System Process | - |
enterprise | T1543.001 | Launch Agent | Calisto adds a .plist file to the /Library/LaunchAgents folder to maintain persistence.1 |
enterprise | T1555 | Credentials from Password Stores | - |
enterprise | T1555.001 | Keychain | Calisto collects Keychain storage data and copies those passwords/tokens to a file.12 |
enterprise | T1005 | Data from Local System | Calisto can collect data from user directories.1 |
enterprise | T1074 | Data Staged | - |
enterprise | T1074.001 | Local Data Staging | Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration.12 |
enterprise | T1564 | Hide Artifacts | - |
enterprise | T1564.001 | Hidden Files and Directories | Calisto uses a hidden directory named .calisto to store data from the victim’s machine before exfiltration.12 |
enterprise | T1070 | Indicator Removal | - |
enterprise | T1070.004 | File Deletion | Calisto has the capability to use rm -rf to remove folders and files from the victim’s machine.1 |
enterprise | T1105 | Ingress Tool Transfer | Calisto has the capability to upload and download files to the victim’s machine.2 |
enterprise | T1056 | Input Capture | - |
enterprise | T1056.002 | GUI Input Capture | Calisto presents an input prompt asking for the user’s login and password.2 |
enterprise | T1036 | Masquerading | - |
enterprise | T1036.005 | Match Legitimate Name or Location | Calisto‘s installation file is an unsigned DMG image under the guise of Intego’s security solution for mac.1 |
enterprise | T1016 | System Network Configuration Discovery | Calisto runs the ifconfig command to obtain the IP address from the victim’s machine.1 |
enterprise | T1569 | System Services | - |
enterprise | T1569.001 | Launchctl | Calisto uses launchctl to enable screen sharing on the victim’s machine.1 |