CoinTicker is a malicious application that poses as a cryptocurrency price ticker and installs components of the open source backdoors EvilOSX and EggShell.[1]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1543 | .001 | 创建或修改系统进程: Launch Agent |
CoinTicker creates user launch agents named .espl.plist and com.apple.[random string].plist to establish persistence.[1] |
| Enterprise | T1140 | 反混淆/解码文件或信息 |
CoinTicker decodes the initially-downloaded hidden encoded file using OpenSSL.[1] |
|
| Enterprise | T1059 | .003 | 命令与脚本解释器: Windows Command Shell |
CoinTicker executes a bash script to establish a reverse shell.[1] |
| .004 | 命令与脚本解释器: Unix Shell |
CoinTicker executes a bash script to establish a reverse shell.[1] |
||
| .006 | 命令与脚本解释器: Python |
CoinTicker executes a Python script to download its second stage.[1] |
||
| Enterprise | T1027 | 混淆文件或信息 |
CoinTicker initially downloads a hidden encoded file.[1] |
|
| Enterprise | T1105 | 输入工具传输 |
CoinTicker executes a Python script to download its second stage.[1] |
|
| Enterprise | T1564 | .001 | 隐藏伪装: Hidden Files and Directories |
CoinTicker downloads the following hidden files to evade detection and maintain persistence: /private/tmp/.info.enc, /private/tmp/.info.py, /private/tmp/.server.sh, ~/Library/LaunchAgents/.espl.plist, ~/Library/Containers/.[random string]/[random string].[1] |
| Enterprise | T1553 | .001 | 颠覆信任控制: Gatekeeper Bypass |
CoinTicker downloads the EggShell mach-o binary using curl, which does not set the quarantine flag.[1] |