Backdoor Activator Malware Running Rife Through Torrents of macOS Apps

macOS.Bkdr.Activator is a multi-stage macOS malware campaign spread through cracked apps distributed via torrent sites, designed to infect users at scale. It patches legitimate cracked software, disables Gatekeeper, and uses Python-based payloads and DNS-based commands to install a persistence mechanism and a remote backdoor.
#macOS.Bkdr.Activator #Kaspersky #SentinelOne

Keypoints

  • The campaign distributes through torrents, delivering a disk image that includes an unusable uncracked app and an Activator patcher that makes the software usable.
  • The Activator.app contains two malicious binaries (GUI in Swift and tool in Objective-C) and a legitimate Python 3.9 installer in the Resources folder.
  • Launching the Activator prompts for an administrator password to disable Gatekeeper (spctl master-disable) and allow apps from “Anywhere.”
  • The tool checks for Python, installs it if missing, and then uses embedded Python code to kill the Notification Center to bypass user alerts about persistence items.
  • The Activator installs a LaunchAgent at /Library/LaunchAgents/launched.%@.plist (with a runtime UUID) for persistence.
  • It retrieves a remote Python script, hashes it via Defaults, and executes it only if the hash changes, then downloads the next stage.
  • DNS-based C2 is used to fetch base64-encoded messages via TXT records, which are decrypted in memory to reveal a Python script and subsequent stage.
  • The campaign affects hundreds of cracked apps; indicators include multiple Mac Mach-O binaries and the listed file paths and LaunchAgent payloads.

MITRE Techniques

  • [T1189] Drive-by Compromise – Initial delivery via torrent link serving a disk image with patcher that infects users. ‘Initial delivery method is via a torrent link which serves a disk image containing two applications: An apparently ‘uncracked’ and unusable version of the targeted software title, and an ‘Activator’ app that patches the software to make it usable.’
  • [T1547.001] Boot or Logon Autostart: Launch Agent – The Activator installs a LaunchAgent at the path described, using a runtime UUID. ‘The Activator.app contains code to install a LaunchAgent at the following path, where the %@ variable is replaced with a UUID string generated at runtime.’
  • [T1562.001] Impair Defenses: Disable Gatekeeper – To allow unsigned apps, it disables Gatekeeper. ‘On launching the Activator.app, victims are asked for an administrator password. This is used to turn off Gatekeeper settings via the spctl master-disable command and to allow apps sourced from ‘Anywhere’ to now run on the device.’
  • [T1059.006] Python – The malware uses embedded Python to perform actions, including killing the Notification Center. ‘The malware uses embedded Python code to kill the Notification Center.’
  • [T1105] Ingress Tool Transfer – It retrieves a remote Python script and checks execution via Defaults before running the script. ‘Prior to executing the Python script and installing the LaunchAgent, the tool attempts to retrieve a remote Python script. If the retrieval is successful, it then leverages the Apple defaults API to determine whether it has ran the same script before.’
  • [T1071.004] Application Layer Protocol: DNS – DNS TXT records are used to deliver base64-encoded messages that decrypt in memory to Python code for the next stage. ‘The malware uses a novel technique of retrieving base64-encoded messages from the snippets contained in the DNS responses. These are then decrypted in-memory and were seen to contain a Python script which reached out to a further remote server to download the next stage.’
  • [T1027.001] Obfuscated/Compressed Files and Information – Base64-encoded messages are decrypted in memory to fetch the next stage. ‘base64-encoded messages from the DNS responses… decrypted in-memory and were seen to contain a Python script…’

Indicators of Compromise

  • [File Paths] Infection indicators – /tmp/python-3.9.6-macosx10.9.pkg, /Applications/Activator.app/Contents/MacOS/GUI, and /Applications/Activator.app/Contents/Resources/tool
  • [Launch Agents] Persistence indicators – /Library/LaunchAgents/launched.%@.plist #regex: /Library/LaunchAgents/launched.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}.plist
  • [SHA1 Mach-O] Hash indicators – 01223c67c44b9cb893576c624ceeb6971d7c8a64, 02a38a5dd5dcff4354fab26601dd766c1d24293e, and 2 more hashes

Read more: https://www.sentinelone.com/blog/backdoor-activator-malware-running-rife-through-torrents-of-macos-apps/