MacMa is a macOS-based backdoor with a large set of functionalities to control and exfiltrate files from a compromised computer. MacMa has been observed in the wild since November 2021.[1] MacMa shares command and control and unique libraries with MgBot and Nightdoor, indicating a relationship with the Daggerfly threat actor.[2]
Domain | ID | Name | Use | |
---|---|---|---|---|
Enterprise | T1123 | Audio Capture | ||
Enterprise | T1059 | .004 | Command and Scripting Interpreter: Unix Shell |
MacMa can execute supplied shell commands and uses bash scripts to perform additional actions.[1][3] |
Enterprise | T1543 | .001 | Create or Modify System Process: Launch Agent |
MacMa installs a |
Enterprise | T1555 | .001 | Credentials from Password Stores: Keychain | |
Enterprise | T1005 | Data from Local System |
MacMa can collect then exfiltrate files from the compromised system.[1] |
|
Enterprise | T1074 | .001 | Data Staged: Local Data Staging |
MacMa has stored collected files locally before exfiltration.[3] |
Enterprise | T1140 | Deobfuscate/Decode Files or Information |
MacMa decrypts a downloaded file using AES-128-EBC with a custom delta.[1] |
|
Enterprise | T1573 | Encrypted Channel |
MacMa has used TLS encryption to initialize a custom protocol for C2 communications.[1] |
|
Enterprise | T1041 | Exfiltration Over C2 Channel |
MacMa exfiltrates data from a supplied path over its C2 channel.[1] |
|
Enterprise | T1083 | File and Directory Discovery |
MacMa can search for a specific file on the compromised computer and can enumerate files in Desktop, Downloads, and Documents folders.[1] |
|
Enterprise | T1070 | .002 | Indicator Removal: Clear Linux or Mac System Logs |
MacMa can clear possible malware traces such as application logs.[1] |
.004 | Indicator Removal: File Deletion | |||
.006 | Indicator Removal: Timestomp |
MacMa has the capability to create and modify file timestamps.[1] |
||
Enterprise | T1105 | Ingress Tool Transfer |
MacMa has downloaded additional files, including an exploit for used privilege escalation.[1][3] |
|
Enterprise | T1056 | .001 | Input Capture: Keylogging |
MacMa can use Core Graphics Event Taps to intercept user keystrokes from any text input field and saves them to text files. Text input fields include Spotlight, Finder, Safari, Mail, Messages, and other apps that have text fields for passwords.[3][4] |
Enterprise | T1106 | Native API | ||
Enterprise | T1095 | Non-Application Layer Protocol |
MacMa has used a custom JSON-based protocol for its C&C communications.[1] |
|
Enterprise | T1571 | Non-Standard Port | ||
Enterprise | T1057 | Process Discovery | ||
Enterprise | T1021 | Remote Services | ||
Enterprise | T1113 | Screen Capture |
MacMa has used Apple’s Core Graphic APIs, such as |
|
Enterprise | T1553 | .001 | Subvert Trust Controls: Gatekeeper Bypass |
MacMa has removed the |
.002 | Subvert Trust Controls: Code Signing |
MacMa has been delivered using ad hoc Apple Developer code signing certificates.[5] |
||
Enterprise | T1082 | System Information Discovery |
MacMa can collect information about a compromised computer, including: Hardware UUID, Mac serial number, macOS version, and disk sizes.[1] |
|
Enterprise | T1016 | System Network Configuration Discovery | ||
Enterprise | T1033 | System Owner/User Discovery |
MacMa can collect the username from the compromised machine.[1] |
ID | Name | References |
---|---|---|
G1034 | Daggerfly |
Daggerfly is linked to the use and potentially development of MacMa through overlapping command and control infrastructure and shared libraries with other unique tools.[2] |