

#Stockfolio current version zip
Researchers believe that this campaign started on April 15, 2020, as that was the date on both the modification timestamps of the files in the ZIP archive, the date the application was signed, and the last‑modified HTTP header when they downloaded the archive. The certificate was issued by Apple on April 6, 2020, and revoked the same day that researchers notified Apple of the malicious application.

Licatrade was signed using a certificate with the common name field set to “Andrey Novoselov” and using developer ID M8WVDT659T. The last line of the shell script sets up a reverse shell to the operators’ server, which then allows attackers to send out the various malicious commands to the malware. However, “it’s interesting to note that persistence is broken in the Licatrade sample: the content of the resulting Launch Agent file (.) isn’t in Property List format as launchd expects, but instead is the command line to be executed,” said Léveillé. In a deep-dive of the Licatrade sample, researchers found that the application bundle includes a shell script (run.sh), which once downloaded launches and attempts to set up persistence on the victims’ system by installing a Launch Agent. The four apps in question have minor differences, but the functionalities are generally the same, researchers said. This most recent campaign has evolved to use new, rebranded apps, researchers said – however, “as in the previous campaigns, the malware reports to a server over HTTP and connects remote terminal sessions to another server using a hardcoded IP address.” GMERA was previously uncovered by researchers with Trend Micro, who in September 2019 said the malware was being spread via trojanized cryptocurrency apps in a separate campaign, leveraging malicious versions of the trading app Stockfolio. Once downloaded, the trojanized apps in question deploy malware called GMERA to collect victims’ browser information (including their cookies and browsing history), access and drain their cryptocurrency wallets and take screenshots of their devices. “Not only did the malware authors wrap the original, legitimate application to include malware they also rebranded the Kattana trading application with new names and copied its original website.” Léveillé, senior malware researcher with ESET, in an analysis last week. “For a person who doesn’t know Kattana, the websites do look legitimate,” said Marc-Etienne M.
#Stockfolio current version archive
The bogus websites include a download button, with a link to a ZIP archive containing the trojanized application bundle. The four fake applications in question, Cointrazer, Cupatrade, Licatrade and Trezarus, claim to be rebranded copies of an actual cryptocurrency trading application offering called Kattana. The actors behind the campaign used websites that copy Kattana’s legitimate website to convince unwitting cryptocurrency enthusiasts to download the fake apps.
#Stockfolio current version mac
Mac users are being targeted by trojanized cryptocurrency trading apps, which once downloaded actually drain victims’ cryptocurrency wallets, researchers warn.
