A new variant of malware, known as FlexibleFerret, has been identified targeting macOS users while evading detection by Apple’s XProtect tool.
This malware is part of a broader campaign attributed to North Korean threat actors, who have been using sophisticated tactics to lure victims into installing malicious software.
The Ferret family of malware, including variants like FROSTYFERRET_UI and FRIENDLYFERRET_SECD, was first reported in December 2023.
These malware components are associated with the “Contagious Interview” campaign, where threat actors trick job seekers into installing malware by masquerading it as necessary software for virtual interviews.
Besides this, cybersecurity experts at SentinelOne discovered that Apple recently updated XProtect to block some of these variants, but FlexibleFerret remains undetected.
FlexibleFerret Analysis
FlexibleFerret is distributed through an Apple Installer package named versus.pkg
, which contains several malicious components, including InstallerAlert.app
, versus.app
, and a standalone binary called zoom
.
The postinstall.sh
script is used to execute these components after installation, logging its progress to /tmp/postinstall.log
.
# Log the start of the script
echo "$(date): Running post-installation script..." >> /tmp/postinstall.log
# Check if the zoom file exists and execute it
if [ -f /var/tmp/zoom ]; then
echo "$(date): Zoom file exists, executing..." >>/tmp/postinstall.log
/var/tmp/zoom >> /tmp/postinstall.log 2>&1 &
else
echo "$(date): Zoom file not found" >> /tmp/postinstall.log
fi
The fake zoom
binary communicates with the domain zoom.callservice[.]us
, which is not a legitimate Zoom domain.
Meanwhile, InstallerAlert.app
tricks users into thinking it’s a legitimate application by displaying an error message, while secretly installing a persistence item in the User’s Library LaunchAgents folder with the label com.zoom.plist
.
The Contagious Interview campaign has expanded beyond targeting job seekers to include developers on platforms like GitHub. Threat actors are using fake issues on legitimate repositories to distribute malware droppers.
Users are advised to be cautious when installing software from untrusted sources and to keep their security software updated.
Indicators of Compromise (IoCs)
- versus.pkg:
388ac48764927fa353328104d5a32ad825af51ce
- InstallerAlert Mach-Os:
1a28013e4343fddf13e5c721f91970e942073b88
,3e16c6489bac4ac2d76c555eb1c263cd7e92c9a5
,76e3cb7be778f22d207623ce1907c1659f2c8215
Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free