Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. CookieMiner

CookieMiner

CookieMiner is mac-based malware that targets information associated with cryptocurrency exchanges as well as enabling cryptocurrency mining on the victim system itself. It was first discovered in the wild in 2019.[1]

ID: S0492
Type: MALWARE
Platforms: macOS
Version: 1.1
Created: 22 July 2020
Last Modified: 16 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1059.004Command and Scripting Interpreter:Unix Shell

CookieMiner has used a Unix shell script to run a series of commands targeting macOS.[1]

.006Command and Scripting Interpreter:Python

CookieMiner has used python scripts on the user’s system, as well as the Python variant of theEmpire agent, EmPyre.[1]

EnterpriseT1543.001Create or Modify System Process:Launch Agent

CookieMiner has installed multiple new Launch Agents in order to maintain persistence for cryptocurrency mining software.[1]

EnterpriseT1555.003Credentials from Password Stores:Credentials from Web Browsers

CookieMiner can steal saved usernames and passwords in Chrome as well as credit card credentials.[1]

EnterpriseT1005Data from Local System

CookieMiner has retrieved iPhone text messages from iTunes phone backup files.[1]

EnterpriseT1140Deobfuscate/Decode Files or Information

CookieMiner has used Google Chrome's decryption and extraction operations.[1]

EnterpriseT1048.003Exfiltration Over Alternative Protocol:Exfiltration Over Unencrypted Non-C2 Protocol

CookieMiner has used thecurl --upload-file command to exfiltrate data over HTTP.[1]

EnterpriseT1083File and Directory Discovery

CookieMiner has looked for files in the user's home directory with "wallet" in their name usingfind.[1]

EnterpriseT1562.004Impair Defenses:Disable or Modify System Firewall

CookieMiner has checked for the presence of "Little Snitch", macOS network monitoring and application firewall software, stopping and exiting if it is found.[1]

EnterpriseT1105Ingress Tool Transfer

CookieMiner can download additional scripts from a web server.[1]

EnterpriseT1027.010Obfuscated Files or Information:Command Obfuscation

CookieMiner has used base64 encoding to obfuscate scripts on the system.[1]

EnterpriseT1496.001Resource Hijacking:Compute Hijacking

CookieMiner has loaded coinmining software onto systems to mine for Koto cryptocurrency.[1]

EnterpriseT1518.001Software Discovery:Security Software Discovery

CookieMiner has checked for the presence of "Little Snitch", macOS network monitoring and application firewall software, stopping and exiting if it is found.[1]

EnterpriseT1539Steal Web Session Cookie

CookieMiner can steal Google Chrome and Apple Safari browser cookies from the victim’s machine.[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp