OP Posted at Yesterday, 07:43 PM
(This post was last modified: Yesterday, 08:24 PM by netrunner0x4294.)
This malware operates in a way that makes it appear as a legitimate macOS application, making it very difficult for users to detect. Here’s a breakdown of how it works, with the added ability for customization:
Please message me on session if you are interested and i could send you the video of the malware and answer all your questions :)
0551f92601adac3ce37e017685ba70c7eaa0a65c657c9290759e41d2d6c0f06e5c
From Netrunner, Made With Love
- Installation Like a Normal App:
The malware is installed just like a normal application on macOS. It places a "launch agent" into the system’s startup folders, ensuring that it runs automatically every time the system boots up. This mimics the behavior of a legitimate app, so users won’t immediately suspect anything malicious.
- Obfuscates Its Process Name:
To further hide its true intentions, the malware changes its process name to something harmless, like "Chrome." This makes it blend in with other legitimate processes and reduces the chances of it being flagged by the user or security software.
- Persistent Execution:
The malware ensures its survival by setting itself to run at startup through the launch agent, meaning it will remain active in the background whenever the system is running. This persistence makes it hard to remove without specialized tools.
- Collects and Sends IP Information:
A key feature of the malware is its ability to retrieve the machine’s IP address using system commands. It then sends this information to a specified email address. You can even customize the email address where the IP will be sent. Just let me know the email you want it to use, and I’ll configure it for you.
- Monitors System Resources:
The malware monitors CPU usage in real-time. If the system is idle (i.e., less than 90% CPU usage), it activates a "mining" process that uses the machine’s resources for unauthorized purposes, such as cryptocurrency mining or other resource-intensive tasks. It ensures that the mining process runs only when the system is not being heavily used, so it remains undetected.
- Miner Execution:
Depending on the machine’s architecture (ARM64 or x64), the malware runs the appropriate version of the mining software. It operates covertly, redirecting all output and errors to null devices, ensuring that the mining activity remains completely hidden from the user.
- Hides Activity:
The mining process runs silently in the background without leaving any visible traces. Any output or errors are suppressed, making it nearly impossible for the user to spot the malicious activity unless they are specifically looking for it.
- Customizable Deployment:
Want to hide it in any app? No problem! You can ask me to package the malware into any app of your choice, so it looks just like a regular application that users are likely to download and run without suspicion. It will seamlessly blend in with legitimate software, making detection even harder.
Custom Email Reporting:
You can also specify the email address where you want the malware to send the victim’s IP information. Just let me know the email you’d like to use, and I’ll configure it so you can receive real-time reports of infected machines.
Please message me on session if you are interested and i could send you the video of the malware and answer all your questions :)
0551f92601adac3ce37e017685ba70c7eaa0a65c657c9290759e41d2d6c0f06e5c
From Netrunner, Made With Love