S0369 CoinTicker
CoinTicker is a malicious application that poses as a cryptocurrency price ticker and installs components of the open source backdoors EvilOSX and EggShell.1
Item | Value |
---|---|
ID | S0369 |
Associated Names | |
Type | MALWARE |
Version | 1.1 |
Created | 23 April 2019 |
Last Modified | 30 March 2020 |
Navigation Layer | View In ATT&CK® Navigator |
Techniques Used
Domain | ID | Name | Use |
---|---|---|---|
enterprise | T1059 | Command and Scripting Interpreter | - |
enterprise | T1059.003 | Windows Command Shell | CoinTicker executes a bash script to establish a reverse shell.1 |
enterprise | T1059.004 | Unix Shell | CoinTicker executes a bash script to establish a reverse shell.1 |
enterprise | T1059.006 | Python | CoinTicker executes a Python script to download its second stage.1 |
enterprise | T1543 | Create or Modify System Process | - |
enterprise | T1543.001 | Launch Agent | CoinTicker creates user launch agents named .espl.plist and com.apple.[random string].plist to establish persistence.1 |
enterprise | T1140 | Deobfuscate/Decode Files or Information | CoinTicker decodes the initially-downloaded hidden encoded file using OpenSSL.1 |
enterprise | T1564 | Hide Artifacts | - |
enterprise | T1564.001 | Hidden Files and Directories | CoinTicker downloads the following hidden files to evade detection and maintain persistence: /private/tmp/.info.enc, /private/tmp/.info.py, /private/tmp/.server.sh, ~/Library/LaunchAgents/.espl.plist, ~/Library/Containers/.[random string]/[random string].1 |
enterprise | T1105 | Ingress Tool Transfer | CoinTicker executes a Python script to download its second stage.1 |
enterprise | T1027 | Obfuscated Files or Information | CoinTicker initially downloads a hidden encoded file.1 |
enterprise | T1553 | Subvert Trust Controls | - |
enterprise | T1553.001 | Gatekeeper Bypass | CoinTicker downloads the EggShell mach-o binary using curl, which does not set the quarantine flag.1 |