Trend Micro’s Antivirus for Mac offers solid malware detection and deterrence in a simple package with a straightforward interface. AV-Test found in its testing that it detected 99.5 percent of. Trend Micro 0 Update as of 6:00 P.M. PST, May 3, 2019: Our continued observation of the malware sample showed that it spoofs popular Mac apps, instead of being included in the app installers themselves as previously reported.
- Trend Micro Max Security Download
- Trend Micro Internet Security App
- Trend Micro Antivirus For Mac
- Install Trend Micro Security
- Trend Micro Security 10 Download
- Trend Micro Internet Security App Machine
- Trend Micro Internet Security App Mac Pro
by Luis Magisa
Unlike in the pre-internet era, when trading in the stock or commodities market involved a phone call to a broker — a move which often meant additional fees for would-be traders — the rise of trading apps placed the ability to trade in the hands of ordinary users. However, their popularity has led to their abuse by cybercriminals who create fake trading apps as lures for unsuspecting victims to steal their personal data. We recently found and analyzed an example of such an app, which had a malicious malware variant that disguised itself as a legitimate Mac-based trading app called Stockfolio.
We found two variants of the malware family. The first one contains a pair of shell scripts and connects to a remote site to decrypt its encrypted codes while the second sample, despite using a simpler routine involving a single shell script, actually incorporates a persistence mechanism.
Sample 1: Trojan.MacOS.GMERA.A
We found the first sample (detected as Trojan.MacOS.GMERA.A) while checking suspicious shell scripts that were flagged by our machine learning system. At first glance, it was challenging to directly identify its malicious behavior because the shell script references other files such as AppCode, .pass and .app. To verify that the behavior was indeed malicious, we sourced the parent file using both our infrastructure and the aggregate website VirusTotal (which had the sample but lacked detections from other major security vendors at the time of writing).
Figure 1. The suspicious shell script which was flagged by our system
The initial sample we analyzed was a zip archive file (detected as Trojan.MacOS.GMERA.A) that contained an app bundle (Stockfoli.app) and a hidden encrypted file (.app). The fake app presents itself as legitimate to trick users, but we found that it contained several malicious components.
Figure 2. Content of the zip file. Note that the app bundle is missing the “o” at the end, whereas the legitimate app is called Stockfolio.
The zip file and its contents
The first suspicious component we found was an app bundle under the Resources directory, which seems to be a copy of the legitimate Stockfolio version 1.4.13 but with the malware author’s digital certificate.
Comparing it to the Resources directory of the current version (1.5) found on the Stockfolio website revealed a number of differences, as shown in the figure below.
Figure 3. Comparison of the app bundle folder structure between the malware variant (top) and the legitimate app (version 1.5, bottom).
Technical Analysis
When the app is executed, an actual trading app interface will appear on-screen. However, unbeknownst to the user, the malware variant is already performing its malicious routines in the background.
Figure 4. interface displayed when the malware app bundle is executed
The main Mach-O executable will launch the following bundled shell scripts in the Resources directory:
- plugin
- stock
![Trend micro internet security download mac Trend micro internet security download mac](/uploads/1/2/6/3/126337498/826829585.png)
The plugin and stock shell scripts
The plugin shell script collects the following information from the infected system:
- username
- IP address
- apps in /Applications
- files in ~/Documents
- files in ~/Desktop
- OS installation date
- file system disk space usage
- graphic/display information
- wireless network information
- screenshots
It then encodes the collected information using base64 encoding and saves the collected information in a hidden file: /tmp/.info. It then uploads the file to hxxps://appstockfolio.com/panel/upload[.]php using the collected username and machine serial number as identifiers.
If a successful response is sent from the URL, it will write the response in another hidden file ~/Library/Containers/.pass
Figure 5 . The “plugin” script
The stock shell script will copy Stockfoli.app/Contents/Resources/appcode to /private/var/tmp/appcode. It then locates the .app file, which is the hidden file in the zip bundle that comes with Stockfoli.app
Figure 6. The “stock” script
It decodes the b64-encoded .app file, executes it, then drops the following:
File | Details |
/tmp/.hostname | gmzera54l5qpa6lm.onion |
/tmp/.privatkey | RSA private key |
It will delete the .app file then check if the file ~/Library/Containers/.pass exists. Using the contents of the ‘.pass’ file as the key, the malware variant will decrypt /private/var/tmp/appcode, which is encrypted using AES-256-CBC. It then saves the decrypted file to /tmp/appcode. Finally, it will execute the appcode. If it fails to do so, it will delete the /tmp/appcode file and ~/Library/Containers/.pass. Note that in the sample we analyzed, the decryption routine failed since the sample was not able to create ~/Library/Containers/.pass.
Figure 7. Comparison of the code-signing information of the malicious app (top) and the legitimate Stockfolio app (bottom)
We suspect the file appcode is a malware file that contains additional routines. However, at the time of writing, we were unable to decrypt this file since the upload URL hxxps://appstockfolio.com/panel/upload[.]php was inaccessible (according to VirusTotal, the domain was active from January to February 2019). Furthermore, we suspect that the full malware routine uses the TOR network due to the presence of the unused address gmzera54l5qpa6lm[.]onion.
Sample 2: Trojan.MacOS.GMERA.B
Using the digital certificate of the first sample, we were able to find a second variant (detected as Trojan.MacOS.GMERA.B) that was uploaded to VirusTotal on June 2019. Like the first variant, it contains an embedded copy of Stockfolio.app version 1.4.13 with the malware author’s digital certificate. It launches the app in a similar manner when executed to disguise its malicious intent.
Figure 8. The bundle structure of Trojan.MacOS.GMERA.B
Once opened, Trojan.MacOS.GMERA.B will execute the embedded copy of Stockfolio version 1.4.13, after which it will launch the shell script run.sh
The script run.sh collects usernames and ip addresses from the infected machine via the following command:
- username = ‘whoami’
- ip address = ‘curl -s ipecho.net/plain’
It connects to the malware URL hxxp://owpqkszz[.]info to send the username and IP address information using the following format:
- hxxp://owpqkszz[.]info/link.php?{username}&{ip address}
As part of its routine, the malware also drops the following files:
File | Details |
/private/tmp/.com.apple.upd.plist | Copy of ~/Library/LaunchAgents/.com.apple.upd.plist |
~/Library/LaunchAgents/.com.apple.upd.plist | Persistence mechanism |
/tmp/loglog | Malware execution logs |
It then creates a simple reverse shell to the C&C server 193[.]37[.]212[.]176. Once connected, the malware author can run shell commands.
Trend Micro Max Security Download
Figure 9. Content of the run.sh shell script