New variant of XLoader macOS Malware masquerading as OfficeNote app

New variant of XLoader macOS Malware masquerading as OfficeNote app

A fresh iteration of the XLoader malware targeting macOS disguises itself under the name ‘OfficeNote’ productivity application.

XLoader macOS


Emerging onto the scene in 2020, XLoader inherits its legacy from Formbook. Functioning as a data exfiltration tool, it adeptly captures information and logs keystrokes. This tool operates through a malware-as-a-service (MaaS) framework.

A modified version tailored for macOS emerged in July 2021, disseminated as a Java application bundled in a compiled .JAR file format.

Highlighting this fact, cybersecurity firm SentinelOne pointed out that these files demand the presence of the Java Runtime Environment. Consequently, the malevolent .jar file finds itself incompatible with a standard macOS setup, as Apple ceased bundling JREs with Mac systems a decade ago.

To overcome this hurdle, the most recent iteration of XLoader ingeniously sidesteps this requirement by transitioning its programming languages to C and Objective C.

This version also includes a disk image file signed on July 17, 2023, a signature that Apple has subsequently revoked.

SentinelOne reported that multiple submissions of the file to VirusTotal were detected throughout July 2023, indicating a widespread operation.

After running, OfficeNote displays an error message stating that it “cannot be opened because the original object cannot be found”, but, in fact, it installs a Launch Agent in the background to maintain persistence.

XLoader targets data from browser-related folders like Google Chrome and Mozilla Firefox, but not Safari. It evades analysis using manual and automated methods and employs sleep commands to delay and disguise suspicious actions. Researchers confirm XLoader remains a danger to macOS users and businesses.

Disguised as an office productivity application, this recent release primarily targets users operating within office environments. The malevolent code’s intention is to pilfer browser secrets for potential future exploitation, along with personal data that could be utilized or traded to facilitate subsequent hacking endeavors.

IOC

SHA1Description
26fd638334c9c1bd111c528745c10d00aa77249dMach-O Payload
47cacf7497c92aab6cded8e59d2104215d8fab86Mach-O Dropper
5946452d1537cf2a0e28c77fa278554ce631223cDisk Image
958147ab54ee433ac57809b0e8fd94f811d523baMach-O Payload

FilePaths
~/73a470tO

23[.]227.38[.]74
62[.]72.14[.]220
66[.]29.151[.]121
104[.]21.26[.]182
104[.]21.32[.]235
104[.]21.34[.]62
137[.]220.225[.]17
142[.]251.163[.]121

www[.]activ-ketodietakjsy620[.]cloud 
www[.]akrsnamchi[.]com 
www[.]brioche-amsterdam[.]com 
www[.]corkagenexus[.]com
www[.]growind[.]info 
www[.]hatch[.]computer
www[.]kiavisa[.]com
www[.]lushespets[.]com
www[.]mommachic[.]com
www[.]nationalrecoveryllc[.]com 
www[.]pinksugarpopmontana[.]com 
www[.]qhsbobfv[.]top 
www[.]qq9122[.]com
www[.]raveready[.]shop
www[.]spv88[.]online 
www[.]switchmerge[.]com

‍Follow Us on: Twitter, InstagramFacebook to get the latest security news!

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!