Regions Targeted: Not specified
Related Families: None
Key Takeaways
What is DigitStealer?
Execution begins when the victim drags a disguised .msi text file into Terminal, triggering a one-liner that uses curl to pull and pipe an obfuscated bash dropper directly into memory. This first-stage script immediately performs geographic filtering by inspecting the user’s AppleLocale preference. Any match against a hard-coded list of former Soviet states and associated countries causes immediate termination, likely an operational security measure to avoid law-enforcement scrutiny in those regions.
The dropper then runs an unusually thorough anti-analysis suite. Beyond standard VM detection via system_profiler and common sysctl queries, it introduces checks specific to Apple Silicon hardware features introduced with the M2 series and later. If any of these expected ARM capabilities are missing or report zero, the script exits. As a result, DigitStealer deliberately refuses to run on Intel Macs, M1 systems, virtualized environments, or analysis sandboxes lacking full M2+ feature parity.
Once checks pass, the dropper uses nohup curl to fetch four additional payloads from Cloudflare Pages infrastructure and executes them directly in memory:
Notably, the Ledger Live modification technique has evolved: instead of dropping a single malicious app.asar, the malware downloads three separate segments, concatenates them in memory, and swaps the trojanized archive into the legitimate application bundle, further complicating static detection.
DigitStealer illustrates the rapid maturation of the macOS threat landscape. By chaining multiple in-memory stages, abusing legitimate services, and introducing hardware-specific anti-analysis checks, the operators achieve both high evasion and precise targeting of high-value Apple Silicon systems while leaving virtually no artifacts on disk.
IOCs
PolySwarm has multiple samples associated with DigitStealer.
226cbbf43d9bcedcc5ab69e51e5cce2f4ca841aa7ab39fdf974766203e2c9b66
5420a25fdd6cb6484ab3687c6bba750b40007730eb4232088b668eff0de2c072
12e630d6041eb7322901150079c0d0fdbd47b0098dc5cb0f2de23b6e8d5082e1
498d271d695e424bfd7f9ad1ead187ef0ac62fa8908c6e1f239db495371ff237
Click here to view all samples of DigitStealer in our PolySwarm portal.
Don’t have a PolySwarm account? Go here to sign up for a free Community plan or subscribe.
Contact us at hivemind@polyswarm.io | Check out our blog | Subscribe to our reports.