Movatterモバイル変換


[0]ホーム

URL:


  1. Home
  2. Software
  3. AppleJeus

AppleJeus

AppleJeus is a family of downloaders initially discovered in 2018 embedded within trojanized cryptocurrency applications.AppleJeus has been used byLazarus Group, targeting companies in the energy, finance, government, industry, technology, and telecommunications sectors, and several countries including the United States, United Kingdom, South Korea, Australia, Brazil, New Zealand, and Russia.AppleJeus has been used to distribute theFALLCHILL RAT.[1]

ID: S0584
Type: MALWARE
Platforms: Windows, macOS
Version: 1.1
Created: 01 March 2021
Last Modified: 16 April 2025
Enterprise Layer
downloadview

Techniques Used

DomainIDNameUse
EnterpriseT1548.002Abuse Elevation Control Mechanism:Bypass User Account Control

AppleJeus has presented the user with a UAC prompt to elevate privileges while installing.[1]

EnterpriseT1071.001Application Layer Protocol:Web Protocols

AppleJeus has sent data to its C2 server viaPOST requests.[1][2]

EnterpriseT1059.004Command and Scripting Interpreter:Unix Shell

AppleJeus has used shell scripts to execute commands after installation and set persistence mechanisms.[1][2]

EnterpriseT1543.003Create or Modify System Process:Windows Service

AppleJeus can install itself as a service.[1]

.004Create or Modify System Process:Launch Daemon

AppleJeus has placed a plist file within theLaunchDaemons folder and launched it manually.[1][2]

EnterpriseT1140Deobfuscate/Decode Files or Information

AppleJeus has decoded files received from a C2.[1]

EnterpriseT1546.016Event Triggered Execution:Installer Packages

DuringAppleJeus's installation process, it usespostinstall scripts to extract a hidden plist from the application's/Resources folder and execute theplist file as aLaunch Daemon with elevated permissions.[2]

EnterpriseT1041Exfiltration Over C2 Channel

AppleJeus has exfiltrated collected host information to a C2 server.[1]

EnterpriseT1564.001Hide Artifacts:Hidden Files and Directories

AppleJeus has added a leading. to plist filenames, unlisting them from the Finder app and default Terminal directory listings.[1]

EnterpriseT1070.004Indicator Removal:File Deletion

AppleJeus has deleted the MSI file after installation.[1]

EnterpriseT1027Obfuscated Files or Information

AppleJeus has XOR-encrypted collected system information prior to sending to a C2.AppleJeus has also used the open source ADVObfuscation library for its components.[1]

EnterpriseT1566.002Phishing:Spearphishing Link

AppleJeus has been distributed via spearphishing link.[1]

EnterpriseT1053.005Scheduled Task/Job:Scheduled Task

AppleJeus has created a scheduled SYSTEM task that runs when a user logs in.[1]

EnterpriseT1553.002Subvert Trust Controls:Code Signing

AppleJeus has used a valid digital signature from Sectigo to appear legitimate.[1]

EnterpriseT1218.007System Binary Proxy Execution:Msiexec

AppleJeus has been installed via MSI installer.[1]

EnterpriseT1082System Information Discovery

AppleJeus has collected the victim host information after infection.[1]

EnterpriseT1569.001System Services:Launchctl

AppleJeus has loaded a plist file using thelaunchctl command.[1]

EnterpriseT1204.001User Execution:Malicious Link

AppleJeus's spearphishing links required user interaction to navigate to the malicious website.[1]

.002User Execution:Malicious File

AppleJeus has required user execution of a malicious MSI installer.[1]

EnterpriseT1497.003Virtualization/Sandbox Evasion:Time Based Checks

AppleJeus has waited a specified time before downloading a second stage payload.[1]

Groups That Use This Software

IDNameReferences
G0032Lazarus Group

[1]

References

×

[8]ページ先頭

©2009-2026 Movatter.jp