OceanLotus

OceanLotus, OSX_OCEANLOTUS.D, Backdoor.MacOS.OCEANLOTUS.F
(Type: Backdoor)

OSX_OCEANLOTUS.D is a MacOS backdoor that has been used by APT32.

[News Analysis] Trends:

Total Trend: 11

Trend Per Year
1
2016
2
2017
1
2018
2
2019
3
2020
2
2021


Trend Per Month
1
Feb 2016
1
May 2017
1
Jun 2017
1
Apr 2018
1
Apr 2019
1
Oct 2019
1
Nov 2020
2
Dec 2020
1
Feb 2021
1
May 2021



[News Analysis] News Mention Another Threat Name:

6 - STRRAT12 - OceanLotus6 - BabyShark6 - Elise6 - Revenge RAT6 - WastedLocker6 - Zebrocy2 - Cobalt Strike2 - KerrDown4 - APT324 - Cuegoe4 - KOMPROGO4 - SOUNDBITE


[TTP Analysis] Technique Performance:

reconnaissance
0/43
resource development
0/45
initial access
0/19
execution
3/36
persistence
2/113
privilege escalation
2/96
defense evasion
9/184
credential access
0/63
discovery
3/44
lateral movement
0/22
collection
2/37
command and control
2/39
exfiltration
0/18
impact
0/26


[TTP Analysis] Mitre Attack Matrix:

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1059.001
Command And Scripting Interpreter : Powershell
T1059.004
Command And Scripting Interpreter : Unix Shell
T1059.005
Command And Scripting Interpreter : Visual Basic
T1543.001
Create Or Modify System Process : Launch Agent
T1543.004
Create Or Modify System Process : Launch Daemon
T1543.001
Create Or Modify System Process : Launch Agent
T1543.004
Create Or Modify System Process : Launch Daemon
T1222.002
File And Directory Permissions Modification : Linux And Mac File And Directory Permissions Modification
T1564.001
Hide Artifacts : Hidden Files And Directories
T1070.004
Indicator Removal : File Deletion
T1070.006
Indicator Removal : Timestomp
T1036.004
Masquerading : Masquerade Task Or Service
T1027
Obfuscated Files Or Information
T1027.002
Obfuscated Files Or Information : Software Packing
T1553.001
Subvert Trust Controls : Gatekeeper Bypass
T1497.001
Virtualization/sandbox Evasion : System Checks
T1082
System Information Discovery
T1016
System Network Configuration Discovery
T1497.001
Virtualization/sandbox Evasion : System Checks
T1560.003
Archive Collected Data : Archive Via Custom Method
T1005
Data From Local System
T1071.001
Application Layer Protocol : Web Protocols
T1105
Ingress Tool Transfer


[Infrastructure Analysis] Based on Related IOC:

IP:Port Timestamp
Domain Timestamp
URL Timestamp


[Target Analysis] Region/Sector:

No information


References:

News Article (Credit @Malpedia)

Microsoft 365 Defender Hunting Queries for hunting multiple threat actors' TTPs and malwares

2021-05-20 by Microsoft from Github (microsoft)

Overview of Ocean Lotus Samples used to target Vietnamese Human Rights Defenders

2021-02-24 by Amnesty International from Github (AmnestyTech)

Taking Action Against Hackers in Bangladesh and Vietnam

2020-12-10 by Nathaniel Gleicher from Facebook

APT32 Multi-stage macOS Trojan Innovates on Crimeware Scripting Technique

2020-12-02 by Phil Stokes from SentinelOne

New MacOS Backdoor Connected to OceanLotus Surfaces

2020-11-27 by Luis Magisa from Trend Micro

Một sample nhắm vào Bank ở VN

2019-10-08 by m4n0w4r from

OceanLotus: macOS malware update

2019-04-09 by Romain Dumont from ESET Research

New MacOS Backdoor Linked to OceanLotus Found

2018-04-04 by Jaromír Hořejší from Trend Micro

The New and Improved macOS Backdoor from OceanLotus

2017-06-22 by Erye Hernandez from Palo Alto Networks Unit 42

Cyber Espionage is Alive and Well: APT32 and the Threat to Global Corporations

2017-05-14 by Nick Carr from FireEye

OceanLotus for OS X – an Application Bundle Pretending to be an Adobe Flash Update

2016-02-17 by Eddie Lee from AT&T Cybersecurity

Basic Information (Credit @etda.or.th)

Tool: OceanLotus

Names: OceanLotus, OSX_OCEANLOTUS.D, Backdoor.MacOS.OCEANLOTUS.F

Description: OSX_OCEANLOTUS.D is a MacOS backdoor that has been used by APT32.

Category: Malware

Type: Backdoor

Information: https://blog.trendmicro.com/trendlabs-security-intelligence/new-macos-backdoor-linked-to-oceanlotus-found/

Information: https://www.welivesecurity.com/2019/04/09/oceanlotus-macos-malware-update/

Information: https://researchcenter.paloaltonetworks.com/2017/06/unit42-new-improved-macos-backdoor-oceanlotus/

Information: https://www.alienvault.com/blogs/labs-research/oceanlotus-for-os-x-an-application-bundle-pretending-to-be-an-adobe-flash-update

Mitre-attack: https://attack.mitre.org/software/S0352/

Malpedia: https://malpedia.caad.fkie.fraunhofer.de/details/osx.oceanlotus

Last-card-change: 2022-12-30

Source: https://apt.etda.or.th/cgi-bin/listtools.cgi

Indicators of Compromise (Credit @ThreatFox)

MD5_HASH
  • 8128a63bab1a0e5802d9db94eb2ce551
  • 10246345345312321313253453547877
  • 2cac346547f90788e731189573828c53
  • 5b87ef34d174361f35b65c5ee684f1c3
  • 9b4c57e61f4df3b546aedf58b2f299cf
  • f8ccff73406a3b6acad964a6376b2ae9
  • 943cb4b5ffb69926803d7f9c3dd1bc7c
  • ec44a1e0f5af1c4bd3f308ff1b3fc879
  • 204e1ad9eb40cdb8270dc9f4d5dfa0ab
SHA256_HASH
  • ed47f3141fd6ac45a8fd8c535ae8814c6cb65bbb86741956ee9a950e74fd11dd
  • 8c3eb1bf5f4b150d29883a548be9e1922c1751409f78c49d1560d219390b5422
  • eeafcce05f9b40cb1c95b36dc9ee5eb109d16e289c6f9bae5fb85772a756d76a
  • 09b9f43c8c70c9d1e2aded67a6c4b4e743e6e5886a25995abd40ad663fa07238
  • 88ea4a892b416cc67d4554a1aa1b7f76c2aa8c31bd3ef2c801f0456c16317cac

TTP Info (Credit @Mitre)

TA0043 TA0042 TA0001 TA0002 TA0003 TA0004 TA0005 TA0006 TA0007 TA0008 TA0009 TA0011 TA0010 TA0040
Reconnaissance Resource Development Initial Access Execution Persistence Privilege Escalation Defense Evasion Credential Access Discovery Lateral Movement Collection Command and Control Exfiltration Impact
T1059.001
COMMAND AND SCRIPTING INTERPRETER : POWERSHELL
osx_oceanlotus.d uses powershell scripts.
T1059.004
COMMAND AND SCRIPTING INTERPRETER : UNIX SHELL
osx_oceanlotus.d uses a shell script as the main executable inside an app bundle and drops an embedded base64-encoded payload to the /tmp folder.
T1059.005
COMMAND AND SCRIPTING INTERPRETER : VISUAL BASIC
osx_oceanlotus.d uses word macros for execution.
T1543.001
CREATE OR MODIFY SYSTEM PROCESS : LAUNCH AGENT
osx_oceanlotus.d can create a persistence file in the folder /library/launchagents.
T1543.004
CREATE OR MODIFY SYSTEM PROCESS : LAUNCH DAEMON
if running with root permissions, osx_oceanlotus.d can create a persistence file in the folder /library/launchdaemons.
T1543.001
CREATE OR MODIFY SYSTEM PROCESS : LAUNCH AGENT
osx_oceanlotus.d can create a persistence file in the folder /library/launchagents.
T1543.004
CREATE OR MODIFY SYSTEM PROCESS : LAUNCH DAEMON
if running with root permissions, osx_oceanlotus.d can create a persistence file in the folder /library/launchdaemons.
T1222.002
FILE AND DIRECTORY PERMISSIONS MODIFICATION : LINUX AND MAC FILE AND DIRECTORY PERMISSIONS MODIFICATION
osx_oceanlotus.d has changed permissions of a second-stage payload to an executable via chmod.
T1564.001
HIDE ARTIFACTS : HIDDEN FILES AND DIRECTORIES
osx_oceanlotus.d sets the main loader file’s attributes to hidden.
T1070.004
INDICATOR REMOVAL : FILE DELETION
osx_oceanlotus.d has a command to delete a file from the system. osx_oceanlotus.d deletes the app bundle and dropper after execution.
T1070.006
INDICATOR REMOVAL : TIMESTOMP
osx_oceanlotus.d can use the touch -t command to change timestamps.
T1036.004
MASQUERADING : MASQUERADE TASK OR SERVICE
osx_oceanlotus.d has disguised its app bundle by adding special characters to the filename and using the icon for legitimate word documents.
T1027
OBFUSCATED FILES OR INFORMATION
osx_oceanlotus.d encrypts its strings in rsa256 and encodes them in a custom base64 scheme and xor.
T1027.002
OBFUSCATED FILES OR INFORMATION : SOFTWARE PACKING
osx_oceanlotus.d has a variant that is packed with upx.
T1553.001
SUBVERT TRUST CONTROLS : GATEKEEPER BYPASS
osx_oceanlotus.d uses the command xattr -d com.apple.quarantine to remove the quarantine file attribute used by gatekeeper.
T1497.001
VIRTUALIZATION/SANDBOX EVASION : SYSTEM CHECKS
osx_oceanlotus.d has variants that check a number of system parameters to see if it is being run on real hardware or in a virtual machine environment, such as sysctl hw.model.
T1082
SYSTEM INFORMATION DISCOVERY
osx_oceanlotus.d collects processor information, memory information, computer name, hardware uuid, serial number, and operating system version. osx_oceanlotus.d has used the ioreg command to gather some of this information.
T1016
SYSTEM NETWORK CONFIGURATION DISCOVERY
osx_oceanlotus.d can collect the network interface mac address on the infected host.
T1497.001
VIRTUALIZATION/SANDBOX EVASION : SYSTEM CHECKS
osx_oceanlotus.d has variants that check a number of system parameters to see if it is being run on real hardware or in a virtual machine environment, such as sysctl hw.model.
T1560.003
ARCHIVE COLLECTED DATA : ARCHIVE VIA CUSTOM METHOD
osx_oceanlotus.d scrambles and encrypts data using aes256 before sending it to the c2 server.
T1005
DATA FROM LOCAL SYSTEM
osx_oceanlotus.d has the ability to upload files from a compromised host.
T1071.001
APPLICATION LAYER PROTOCOL : WEB PROTOCOLS
osx_oceanlotus.d can use http post and get requests to send and receive c2 information.
T1105
INGRESS TOOL TRANSFER
osx_oceanlotus.d has a command to download and execute a file on the victim’s machine.