Ocean Mac OS

  1. Ocean Man Ocean Man
  2. Ocean Mac Os Catalina
  3. Ocean Man Osu Beatmap
  4. Ocean Man Osu

What is ocenaudio for Mac ocenaudio is a cross-platform, easy to use, fast and functional audio editor. It is the ideal software for people who need to edit and analyze audio files without complications. Ocenaudio also has powerful features that will please more advanced users.

Ocean Man Ocean Man

Find games for macOS tagged ocean like The Fish Market, Raft, Oceanarium, Ocean Avenue, How Now, Sea Cow? On itch.io, the indie game hosting marketplace. With Google Earth for Chrome, fly anywhere in seconds and explore hundreds of 3D cities right in your browser. Roll the dice to discover someplace new, take a guided tour with Voyager, and create. The ultimate script might be discovered on our Github repository. As not too long ago documented in one other of our articles, the OceanLotus group retains enhancing and updating its toolset, and as soon as once more, it has improved its instruments for concentrating on Mac customers.The code has not modified that a lot, however as a result of many Mac customers don’t run safety software.

Latest ESET research describes the inner workings of a recently found addition to OceanLotus’s toolset for targeting Mac users

Early in March 2019, a new macOS malware sample from the OceanLotus group was uploaded to VirusTotal, a popular online multi-scanner service. This backdoor executable bears the same features as the previous macOS variant we looked at, but its structure has changed and its detection was made harder. Unfortunately, we couldn’t find the dropper associated with this sample so we do not know the initial compromise vector.

We recently published a detailed update about OceanLotus and how its operators employ a wide range of techniques to gain code execution, achieve persistence, and leave as little trace as possible on a Windows system. OceanLotus is also known to have a malicious macOS component. This article details what has changed from the previous macOS version analyzed by Trend Micro and describes how, while analyzing this variant’s code, you can automate string decryption using the IDA Hex-Rays API.

The following three sections of this blogpost describe the analysis of the sample with the SHA-1 hash E615632C9998E4D3E5ACD8851864ED09B02C77D2. The file is named flashlightd and is detected by ESET products as OSX/OceanLotus.D.

Anti-debug and anti-sandbox

As usual for OceanLotus macOS binaries, the sample is packed with UPX, but most packer identification tools do not recognize it as such, probably because they mostly include a signature that relies on the presence of a “UPX” string, and further, Mach-O signatures are less common and not as regularly updated. This particular characteristic makes static detection more difficult. Once unpacked, one interesting thing is that the entry point is located at the beginning of the __cfstring section in the .TEXT segment. This section has the flag attributes seen in Figure 1.

As seen in Figure 2, the fact that the code is in the __cfstring section tricks some disassembly tools to display the code as strings.

Figure 2. The backdoor code is defined as data by IDA

When run, the binary first creates a thread as an anti-debugging watchdog whose sole purpose is to continuously check if a debugger is present. In order to do that, this thread:

  • Tries to detach any debugger by calling ptrace with PT_DENY_ATTACH as a request parameter
  • Checks if some exception ports are open by calling the task_get_exception_ports function
  • Checks if a debugger is attached, as seen in Figure 3, by verifying if the P_TRACED flag is set in the current process

Figure 3. Check if a debugger is attached via sysctl function

If the watchdog detects that a debugger is present the exit function is called. Moreover, the sample then checks its environment by issuing the following two commands:
ioreg -l grep -e “Manufacturer” and sysctl hw.model
and checks the return value against a hardcoded list of known virtualization system strings: oracle, vmware, virtualbox or parallels. Finally, the command:
system_profiler SPHardwareDataType 2>/dev/null awk ‘/Boot ROM Version/ {split($0, line, “:”);printf(“%s”, line[2]);}
checks if the machine is one of the following: “MBP”, “MBA”, “MB”, “MM”, “IM”, “MP” and “XS”. These codes represent the model of the system. For instance, “MBP” stands for MacBook Pro, “MBA” stands for MacBook Air and so on…

Major updates

Even though the backdoor commands have not changed since the Trend Micro article, we noticed a few other modifications. The C&C servers used for this sample are quite recent as their creation date is 2018-10-22.

  • daff.faybilodeau[.]com
  • sarc.onteagleroad[.]com
  • au.charlineopkesston[.]com

The URL resource used has changed to /dp/B074WC4NHW/ref=gbps_img_m-9_62c3_750e6b35.

The first packet that is sent to the C&C server contains more information regarding the host machine. All data gathered by the commands in the following table are included.

CommandsDescription
system_profiler SPHardwareDataType 2>/dev/null awk '/Processor / {split($0,line,':'); printf('%s',line[2]);}'
machdep.cpu.brand_string
Gather processor information
system_profiler SPHardwareDataType 2>/dev/null awk '/Memory/ {split($0,line, ':'); printf('%s', line[2]);}'Gather memory information
ifconfig -lGather network interface MAC addresses
ioreg -rd1 -c IOPlatformExpertDevice awk '/IOPlatformSerialNumber/ { split($0, line, ''); printf('%s', line[4]); }'Retrieves the serial number of the device

On top of this configuration change, this sample does not use the libcurl library for network exfiltration. Instead, it uses an external library. To locate it, the backdoor tries to decrypt each file in the current directory using AES-256-CBC with the key gFjMXBgyXWULmVVVzyxy padded with zeroes. Each file is “decrypted” and saved as /tmp/store and an attempt to load it as a library made using the dlopen function. When a decryption attempt results in a successful call to dlopen, the backdoor then retrieves the exported functions Boriry and ChadylonV, which seem to be responsible for the network communication with the server. As we do not have the dropper or other files from the original sample’s location, we could not analyse this library. Moreover, since the component is encrypted, a YARA rule based on these strings would not match the file found on disk.

As described in the analysis of the group’s previous macOS backdoor, a clientID is created. This identifier is the MD5 hash of the return value of one of the following commands:

  • ioreg -rd1 -c IOPlatformExpertDevice awk ‘/IOPlatformSerialNumber/ { split($0, line, “””); printf(“%s”, line[4]); }’
  • ioreg -rd1 -c IOPlatformExpertDevice awk ‘/IOPlatformUUID/ { split($0, line, “””); printf(“%s”, line[4]); }’
  • ifconfig en0 awk ’/ether /{print $2}’ (obtain the MAC address)
  • an unknown command (“x1ex72x0a“) which used to be “uuidgen” in the previous samples

Before being hashed, the character “0” or “1” is appended to the return value indicating root privileges. This clientID is stored in /Library/Storage/File System/HFS/25cf5d02-e50b-4288-870a-528d56c3cf6e/pivtoken.appex if the code runs as root, or in ~/Library/SmartCardsServices/Technology/PlugIns/drivers/snippets.ecgML otherwise. This file is normally hidden via the _chflags function and its timestamp is modified using the “touch –t” command with a random value.

String decryption

Like previous variants, the strings are encrypted using AES-256-CBC (hex-encoded key: 9D7274AD7BCEF0DED29BDBB428C251DF8B350B92 padded with zeroes and the IV is filled with zeroes) using the CCCryptfunction. The key has changed from previous versions but since the group is still using the same algorithm to encrypt strings, decryption could be automated. Along with this article, we are releasing an IDA script leveraging the Hex-Rays API to decrypt the strings present in the binary. This script may help future analysis of OceanLotus and the analysis of existing samples that we have not yet been able to obtain. At the core of this script lies a generic method to obtain the arguments passed to a function. Moreover, it looks for the parameter assignments in order to find their values. This method could be reused to retrieve the list of arguments of a function and then pass them to a callback.

Knowing the prototype of the decrypt function, the script first finds all cross-references to this function, finds all the arguments, decrypts the data and puts the plaintext inside a comment at the address of the cross-reference. In order for the script to work correctly, the custom alphabet used by the base64 decode function must be set in the script and the global variable containing the length of the key must be defined (as a DWORD in this case; see Figure 4).

In the Function window, you can right-click the decryption function and click “Extract and decrypt arguments”. The script should put the decrypted strings in comments, much as in Figure 5.

Figure 5. Decrypted text is put into comments

This conveniently lists the decrypted strings together in IDA’s xrefs to window for that function, as seen in Figure 6.

The final script can be found on our Github repository.

As recently documented in another of our articles, the OceanLotus group keeps improving and updating its toolset, and once again, it has improved its tools for targeting Mac users. The code has not changed that much, but because many Mac users don’t run security software on their machines, the need to evade detection is of less importance. ESET products already detected this file when we found it. Since the network library used for the C&C communication is now encrypted on the disk, the exact network protocol used remains unknown.

The IoCs in this blogpost, as well as the MITRE ATT&CK attributes, are also available in our GitHub repository.

Ocean man costume

Domain names

  • daff.faybilodeau[.]com
  • sarc.onteagleroad[.]com
  • au.charlineopkesston[.]com

URL resource

  • /dp/B074WC4NHW/ref=gbps_img_m-9_62c3_750e6b35

File paths

  • ~/Library/SmartCardsServices/Technology/PlugIns/drivers/snippets.ecgML
  • /Library/Storage/File System/HFS/25cf5d02-e50b-4288-870a-528d56c3cf6e/pivtoken.appex
  • /tmp/store
Sample analyzedSHA-1 hashESET detection name
fleshlightdE615632C9998E4D3E5ACD8851864ED09B02C77D2OSX/OceanLotus.D
TacticIDNameDescription
Defense EvasionT1158Hidden Files and DirectoriesThe backdoor hides the clientID file via chflags function.
T1107File DeletionThe backdoor can receive a “delete” command.
T1222File Permissions ModificationThe backdoor changes the permission of the file it wants to execute to 755.
T1027Obfuscated Files or InformationThe library used for network exfiltration is encrypted with AES-256 in CBC mode.
T1099 (macOS)TimestompThe timestamp of the file storing the clientID is modified with a random value.
DiscoveryT1082System Information DiscoveryThe backdoor performs a fingerprint of the machine on its first connection to the C&C server.
ExfiltrationT1022Data EncryptedThe backdoor encrypts the data before exfiltration.
Command and ControlT1094Custom Command and Control ProtocolThe backdoor implements a specific format for the packet involving random values. See Trend Micro article.

Ocean Mac Os Catalina

Discussion

Naruto: Kunoichi Trainer Free Download Mac Game Full Version via direct link. Download the free full version of Naruto: Kunoichi Trainer for Mac, Mac OS X, and PC. Naruto: Kunoichi Trainer Game It Is Full And Complete Game. Just Download, Run Setup, And Install.

Ocean mac os download

Naruto: Kunoichi Trainer Mac Game Overview

After continual viewing of Naruto for a several days, you end up near the main entrance of Konocha somehow. You are met by three familiar to you girls: Hinata, Ino and Sakura. Obviously, they confused you with someone else so you put a bold face on and decide to play along. As it turns out later, you are the invited trainer for girls above mentioned… It is time to decide what your trainings are gonna be like… Though… Since it is a dream, maybe you can have some «fun» with them… Can something so vivid be just a dream…?

How to Install Naruto: Kunoichi Trainer Mac Game

  1. Click “Download” Button Below.
  2. Download Page Will Start
  3. You Should Agree With “User License Agreement” and click “I Understand” Button.
  4. Save Game/Software By Selecting Path.
  5. Download Process With Start.
  6. Once Download is Completed, Install, and Enjoy!

Ocean Man Osu Beatmap

Naruto: Kunoichi Trainer Mac Game full. free download

Ocean Man Osu

Click On The Below Button To Start Naruto: Kunoichi Trainer Download. It Is Full And Complete Game. Just Download And Start Playing It. We Have Provided Direct Link Full Setup Of The Game.