Hackers Find New Ways to Use .EXE File Against macOS to Launch Malware that Bypass Protection & Steal Data

Yes, What you hear is something mysterious that the .EXE file runs on macOS is totally new right. but this strange activity uncovered by security researchers that, an EXE files in the wild delivering a malicious payload on Mac.

It is not only launching the malware but the .exe file is capable of bypass the mac security mechanism such as Gatekeeper.

Basically, EXE files format is an official and dedicated windows file format that wont be able to run on Linux, macOS, but if it tries to run on it then both OS will throw the error message.

SIEM as a Service

In this case, new .EXE file routine evades the Gatekeeper protection on Mac because it checks only native Mac files but it will not checking the EXE and bypasses the signature detection and verification.

This is new malware attack mostly learn from the countries such as
United Kingdom, Australia, Armenia, Luxembourg, South Africa and the United States.

Infection & Bhaviour on Mac

Researchers found “Little Snitch” An installer of popular firewall app
that can be downloaded from various torrent websites for Mac and windows .

Once extracted the Zip File. Some of the Zipped .NET compiled Windows executable sample which contains a .DMG file hosting the installer for Little Snitch.

Later analysing the installer contents, researchers found the very unusual
.EXE file inside of the MonoBundle that is eventually responsible for the malicious payload.

Mono Bundle turn your Mono application into a Mac bundle, and you can also get a Mac installer for your application.

According to Trend Micro, “When the installer is executed, the main file also launched the executable as it is enabled by the mono framework included in the bundle. This framework allows the execution of Microsoft .NET applications across platforms such as OSX. “

Once the .DMG files are ready then it popup the adware that posed as a legitimate flash player installer and also PUAs displayed when the file is run.

This specific malicious .EXE file was tired attempt to execute in the windows machine but it displays the error.

“The bundling of the files with the said framework becomes a workaround to bypass the systems given EXE is not a recognized binary executable by MacOS’ security features. As for the native library differences between Windows and MacOS, mono framework supports DLL mapping to support Windows-only dependencies to their MacOS counterparts.” Trend Micro Researchers said.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Also Read:

Lazarus APT Group Attack Cryptocurrency Exchange using macOS Malware Under the Operation AppleJeus

Apple Released Security Update & Fixes for iOS FaceTime Zero-day Vulnerability

XMRig – New Cryptojacking Malware Attack on Apple Mac Devices