Skip to content

Latest commit

 

History

History
74 lines (58 loc) · 3.93 KB

yispecter.md

File metadata and controls

74 lines (58 loc) · 3.93 KB
ID X0024
Aliases None
Platforms iOS
Year 2015
Associated ATT&CK Software YiSpecter

YiSpecter

YiSpecter is Apple iOS malware that can download, install and launch arbitrary iOS apps, replace existing apps with those it downloads, hijack other apps’ execution to display advertisements, change Safari’s default search engine, bookmarks and opened pages, and upload device information to a C2 server. It uses tricks to hide its icons from iOS’s SpringBoard, which prevents the user from finding and deleting it. The components also use the same name and logos of system apps to trick iOS power users. [1]

ATT&CK Techniques

See ATT&CK: YiSpecter - Techniques Used.

Enhanced ATT&CK Techniques

Name Use
Defense Evasion::Hide Artifacts (E1564) Hides icons from iOS's SpringBoard as well as use the same name and logos of system apps to trick iOS power users [1]
Persistence::Modify Existing Service (F0011) Hijacks other installed applications' launch routines to use "ADPage" (an installed malicious app) to display advertisements [1]
Lateral Movement::Supply Chain Compromise::Exploit Private APIs (E1195.m02) Use of the private api allowed both Installation of malicious apps and uninstallation of legitimate apps without user notification [1]
Lateral Movement::Supply Chain Compromise::Abuse Enterprise Certificates (E1195.m01) YiSpecter's malicious apps were signed with three iOS enterprise certificates issued by Apple so they can be installed as enterprise apps on non-jailbroken iOS devices via in-house distribution [1]
Impact::Generate Fraudulent Advertising Revenue::Advertisement Replacement Fraud (E1472.m02) Displays brief advertisements whenever the user opens applications on their phone [1]

MBC Behaviors

Name Use
Execution::Install Additional Program (B0023) Can download and install arbitrary iOS apps [1]
Command and Control::Command and Control Communication::Send System Information (B0030.006) Connects to the command and control server using HTTP to send device information [1]
Defense Evasion::Install Insecure or Malicious Configuration (B0047) Changes iOS Safari's default configuration [1]

Indicators of Compromise

SHA256 Hashes

  • 57cc101ee4a9f306236d1d4fb5ccb3bb96fa76210142a5ec483a49321d2bd603
  • 4938b9861b7c55fbbe47d2ba04e9aff2da186e282f1e9ff0a15bbb22a5f6e0e7
  • fc55c5ced1027b48885780c87980a286181d3639dfc97d03ebe04ec012a1b677
  • 5259854994945a165996d994e6484c1afc1c7e628cb5df2dc3750f4f9f92202e
  • 7714dbb85c5ebcd85cd1d93299479cff2cc82ad0ed11803c24c44106530d2e2f
  • ddd16577b458a5ec21ea0f57084033435a46f61dc5482f224c1fe54f47d295bc
  • 8fa135fc74583e05be208752e8ce191060b1617447815a007efac78662b425d0

C2 Server:

  • bb800.com
  • iosnoico.bb800[.]com: used to upload informati on, download confi gs and commands, downloadmalicious components
  • qvod.bb800[.]com: used to download main app
  • qvios.od.bb800[.]com: used to download main app
  • dp.bb800[.]com: used to download promoted iOS apps
  • iosads.cdn.bb800[.]com: used to download promoted iOS apps and malicious components

References

[1] http://researchcenter.paloaltonetworks.com/2015/10/yispecter-first-ios-malware-attacks-non-jailbroken-ios-devices-by-abusing-private-apis/