Infostealers targeting macOS are evolving, with a new Rust-based infostealer exhibiting behaviors similar to the leaked Banshee infostealer. Continuous monitoring is crucial due to these adaptive threats. Affected: macOS systems, browsers, cryptocurrency wallets
Keypoints :
- A new infostealer written in Rust was identified and exhibits similar behaviors to the leaked Objective-C infostealer “Banshee”.
- The infostealer targets browsers, wallets, and extensions.
- Function names in the Rust application suggest similarities with the Banshee source code.
- The Rust application captures launch arguments to initialize its operations.
- Detection methods for virtual machines and debuggers were incorporated in the infostealer’s operations.
- The application is currently connecting to localhost, indicating it may still be in development.
- Similarities in targeted file paths and extension IDs between the Rust infostealer and Banshee were observed.
- The analysis emphasizes the need for vigilance as macOS malware evolves.
MITRE Techniques :
- Execution (T1203): The application executes commands such as “killall Terminal” using the Command::new() function.
- Credential Dumping (T1003): Collecting wallet information from targeted paths to harvest sensitive data.
- Obfuscated Files or Information (T1027): Uses similar function names and structures as Banshee, making it harder to detect.
- Exfiltration Over Command and Control Channel (T1041): The application connects to localhost for data exfiltration.
- Query System Information (T1002): Executes commands to gather details about the system and check for virtual machine environments.
Indicator of Compromise :
- [SHA-256] dea72cdd7c9dfc49f0a19581086c8e6e99b000dc33f461ece8b9f37c1bd7068d
- [IP Address] 127.0.0.1
- [Port] 3030
Full Story: https://blog.kandji.io/banshee-rust-rewrite