Executive Summary
Key Takeaways
What is RustBucket?
Jamf Threat Labs recently reported on RustBucket, a multistage malware targeting MacOS devices. RustBucket is being used by the threat actor group BlueNoroff. RustBucket is a multi-stage tool that can be used to communicate with the C2 to download and execute additional payloads.
Stage One
The Stage One malware is an AppleScript file contained in an unsigned application known as Internal PDF Viewer.app. In order for the infection to be successful, the user must manually override MacOS’s Gatekeeper protections. Following a successful infection, the stage one malware fetches and executes the second stage payload, which is a signed application masquerading as a legitimate Apple bundle identifier.
Stage Two
The Second Stage payload is written in Objective-C. It allows the victim to view PDF files and initiates the next phase of the attack chain when the victim opens a malicious PDF. In essence, the malicious PDF acts as a key to execute the next attack phase. This makes analysis of the malware slightly more difficult, as a PDF is needed. Jamf noted one of the lure documents was investment themed. The second stage payload communicates with the C2 to download the stage three payload.
Stage Three
The Stage Three payload, written in Rust, is a Mach-O executable and can target both ARM and x86 architectures. RustBucket can gather system information and lets the threat actor perform various actions on the victim machine.
Who is BlueNoroff?
IOCs
PolySwarm has multiple samples of RustBucket.
7981ebf35b5eff8be2f3849c8f3085b9cec10d9759ff4d3afd46990520de0407
Bea33fb3205319868784c028418411ee796d6ee3dfe9309f143e7e8106116a49
3d41cd5199dbd6cefcc78d53bb44a2ecbea716de2bc8e547ead7c2aebd9925f0
8e234482db790fa0a3d2bf5f7084ec4cfb74bffd5f6cbdc5abdbc1350f58e3fe
You can use the following CLI command to search for all RustBucket samples in our portal:
$ polyswarm link list -f RustBucket
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or to subscribe.
Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports