OSX.Bella: Mac Malware Strikes AgainThis variant of the OSX.Dok dropper behaves altogether differently, and installs a completely different payload.
On Friday, a sophisticated Mac Trojan was discovered called OSX.Dok, which installs malware designed to intercept all HTTP and HTTPS traffic. This morning, Adam Thomas, a Malwarebytes researcher, found a variant of the OSX.Dok dropper that behaves altogether differently and installs a completely different payload.
This variant has the same form as the dropper for OSX.Dok – a zipped app named Dokument.app, masquerading as a document. It is signed with the same (now revoked) certificate as the previous OSX.Dok dropper and it was first uploaded to VirusTotal around the same time.
As with the previous variant, this one also copies itself to /Users/Shared/AppStore.app, and displays the same alert claiming that the app is damaged. However, this variant never displays the fake “OS X Updates Available” window, covering the entire screen. After a minute or so, it simply closes and deletes itself.
Instead of installing OSX.Dok, this dropper installs an open-source backdoor named Bella, created by someone who identifies himself on GitHub only as “Noah.”
Noah has been creating Python scripts to attack various macOS data, such as stealing iCloud authorization tokens, or password and credit card information from Chrome. In February of this year, he released Bella, which combines functionality from previous scripts with new functionality:
- Exfiltration of iMessage and SMS chat transcripts
- Location of devices via Find My iPhone and Find My Friends
- Phishing of passwords
- Exfiltration of the keychain
- Capture of data from the microphone and webcam
- Creation and exfiltration of screenshots
- Remote shell and screen sharing
Bella even includes the capability to escalate to root privileges via vulnerabilities in the system (which only work on macOS 10.12.1 and earlier), or phishing to obtain an admin user password. Some of the above capabilities rely on gaining root privileges, while others do not.
Image Source: Malwarebytes
Bella can be customized in some aspects. This copy uses the following command server:
host = '220.127.116.11' #Command and Control IP (listener will run on)
port = 4545 #What port Bella will operate over
This address is owned by a hosting company located in Moscow, Russia.
The malware has also been set to install the script, database, and launch agent files in the following locations:
If root access can be achieved, it will instead be placed in the corresponding locations in the root library folder, rather than the user’s library folder.
Although this particular delivery app is dead at this point, Bella is open-source and surprisingly powerful for a Python script. It’s quite likely that it will be dropped by other malicious installers in the future.
Malwarebytes for Mac detects this malware as OSX.Bella. If you’ve been infected with this malware, after removing it, be sure to change all your passwords as well. Business users should be aware that this malware could exfiltrate a large amount of company data, including passwords, code signing certificates, hardware locations and much more. If you’ve been infected, contact your IT department.
OSX.Dok: New & Sophisticated Mac Malware Strikes
Thomas Reed is a self-trained developer and Apple security expert, and is director of Mac offerings at Malwarebytes. View Full Bio