macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
A new variant of macOS.ZuRu malware has been discovered, targeting users through a trojanized version of the Termius app. This backdoor, initially noted in 2021, now uses a modified Khepri C2 framework for post-infection operations. The malware is delivered via a .dmg disk image containing a hacked version of Termius.app. It adds two executables to the embedded Termius Helper.app and uses a new method to trojanize legitimate applications. The malware installs persistence via a LaunchDaemon and includes an md5 updater mechanism. The payload obtained from the C2 is a modified Khepri beacon with capabilities for file transfer, system reconnaissance, and command execution. The threat actor continues to target developers and IT professionals, adapting their techniques to evade detection.
AI Analysis
Technical Summary
The macOS.ZuRu malware has resurfaced with a new variant that targets macOS users by distributing a trojanized version of the Termius SSH client application. This malware campaign leverages a modified Khepri Command and Control (C2) framework to conduct post-infection activities. The infection vector involves a malicious .dmg disk image containing a compromised Termius.app, which has been altered to include two additional executables embedded within the Termius Helper.app. This new trojanization method allows the malware to masquerade as a legitimate application, increasing the likelihood of user installation and evasion of detection mechanisms. Once installed, the malware establishes persistence on the infected system via a LaunchDaemon, ensuring it runs continuously across reboots. It also incorporates an MD5-based updater mechanism to maintain and update its payload stealthily. The payload itself is a modified Khepri beacon that enables the threat actor to perform a variety of malicious actions, including file transfers, system reconnaissance, and arbitrary command execution. The campaign specifically targets developers and IT professionals, likely due to their frequent use of SSH clients like Termius and their access to sensitive infrastructure. The malware’s capabilities align with multiple MITRE ATT&CK techniques such as T1021.004 (Remote Services: SSH), T1553.001 (Subvert Trust Controls: Code Signing), T1082 (System Information Discovery), T1140 (Deobfuscate/Decode Files or Information), T1543.004 (Create or Modify System Process: Launch Daemon), T1057 (Process Discovery), T1547.001 (Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder), T1059.004 (Command and Scripting Interpreter: AppleScript), T1027 (Obfuscated Files or Information), T1071.001 (Application Layer Protocol: Web Protocols), T1105 (Ingress Tool Transfer), and T1569.002 (System Services: Service Execution). Indicators of compromise include specific file hashes and domains used for C2 communications. Although no CVE or known exploits in the wild are reported, the malware’s stealthy persistence and targeting of privileged users make it a significant threat to macOS environments.
Potential Impact
For European organizations, particularly those employing macOS devices in development, IT operations, or infrastructure management, this threat poses a substantial risk. The malware’s ability to establish persistence and execute arbitrary commands can lead to unauthorized access to sensitive systems, data exfiltration, and lateral movement within corporate networks. Developers and IT professionals are prime targets, meaning organizations with sizable technical teams using Termius or similar SSH clients are at elevated risk. Compromise could result in intellectual property theft, disruption of critical services, and potential exposure of confidential customer or business data. Additionally, the malware’s evasion techniques and updater mechanism complicate detection and remediation efforts, increasing dwell time and potential damage. The use of legitimate-looking applications as infection vectors may also undermine user trust and complicate incident response. Given the increasing adoption of macOS in enterprise environments across Europe, the threat could impact sectors such as finance, technology, telecommunications, and government agencies, where secure remote access tools are prevalent.
Mitigation Recommendations
To mitigate this threat effectively, European organizations should implement a multi-layered defense strategy tailored to the specifics of this campaign: 1) Enforce strict application whitelisting policies to prevent execution of unauthorized or trojanized applications, especially for critical tools like SSH clients. 2) Verify the integrity and authenticity of software downloads by using official sources and validating digital signatures before installation. 3) Deploy endpoint detection and response (EDR) solutions with capabilities to detect anomalous LaunchDaemon creations, suspicious helper app modifications, and unusual network communications to known malicious domains. 4) Monitor network traffic for connections to the identified C2 domains (e.g., ctl01.macnavicat.com, ctl01.termius.fun) and block or alert on such communications. 5) Educate developers and IT staff on the risks of installing software from untrusted sources and encourage the use of managed software deployment tools. 6) Implement robust logging and monitoring of system processes and file changes, focusing on md5 hash changes indicative of updater mechanisms. 7) Regularly audit macOS systems for persistence mechanisms such as LaunchDaemons and unauthorized helper app modifications. 8) Employ network segmentation to limit the lateral movement potential of compromised endpoints. 9) Maintain up-to-date backups and incident response plans tailored to macOS environments to enable rapid recovery if infection occurs.
Affected Countries
Germany, United Kingdom, France, Netherlands, Sweden, Finland, Ireland
Indicators of Compromise
- hash: a7a9b0f8cc1c89f5c195af74ce3add74733b15c0
- hash: ace81626924c34dfbcd9a485437cbb604e184426
- hash: de8aca685871ade8a75e4614ada219025e2d6fd7
- hash: fa9b89d4eb4d47d34f0f366750d55603813097c1
- domain: ctl01.macnavicat.com
- domain: ctl01.termius.fun
- domain: download.finalshell.cc
- domain: download.termius.info
macOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
Description
A new variant of macOS.ZuRu malware has been discovered, targeting users through a trojanized version of the Termius app. This backdoor, initially noted in 2021, now uses a modified Khepri C2 framework for post-infection operations. The malware is delivered via a .dmg disk image containing a hacked version of Termius.app. It adds two executables to the embedded Termius Helper.app and uses a new method to trojanize legitimate applications. The malware installs persistence via a LaunchDaemon and includes an md5 updater mechanism. The payload obtained from the C2 is a modified Khepri beacon with capabilities for file transfer, system reconnaissance, and command execution. The threat actor continues to target developers and IT professionals, adapting their techniques to evade detection.
AI-Powered Analysis
Technical Analysis
The macOS.ZuRu malware has resurfaced with a new variant that targets macOS users by distributing a trojanized version of the Termius SSH client application. This malware campaign leverages a modified Khepri Command and Control (C2) framework to conduct post-infection activities. The infection vector involves a malicious .dmg disk image containing a compromised Termius.app, which has been altered to include two additional executables embedded within the Termius Helper.app. This new trojanization method allows the malware to masquerade as a legitimate application, increasing the likelihood of user installation and evasion of detection mechanisms. Once installed, the malware establishes persistence on the infected system via a LaunchDaemon, ensuring it runs continuously across reboots. It also incorporates an MD5-based updater mechanism to maintain and update its payload stealthily. The payload itself is a modified Khepri beacon that enables the threat actor to perform a variety of malicious actions, including file transfers, system reconnaissance, and arbitrary command execution. The campaign specifically targets developers and IT professionals, likely due to their frequent use of SSH clients like Termius and their access to sensitive infrastructure. The malware’s capabilities align with multiple MITRE ATT&CK techniques such as T1021.004 (Remote Services: SSH), T1553.001 (Subvert Trust Controls: Code Signing), T1082 (System Information Discovery), T1140 (Deobfuscate/Decode Files or Information), T1543.004 (Create or Modify System Process: Launch Daemon), T1057 (Process Discovery), T1547.001 (Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder), T1059.004 (Command and Scripting Interpreter: AppleScript), T1027 (Obfuscated Files or Information), T1071.001 (Application Layer Protocol: Web Protocols), T1105 (Ingress Tool Transfer), and T1569.002 (System Services: Service Execution). Indicators of compromise include specific file hashes and domains used for C2 communications. Although no CVE or known exploits in the wild are reported, the malware’s stealthy persistence and targeting of privileged users make it a significant threat to macOS environments.
Potential Impact
For European organizations, particularly those employing macOS devices in development, IT operations, or infrastructure management, this threat poses a substantial risk. The malware’s ability to establish persistence and execute arbitrary commands can lead to unauthorized access to sensitive systems, data exfiltration, and lateral movement within corporate networks. Developers and IT professionals are prime targets, meaning organizations with sizable technical teams using Termius or similar SSH clients are at elevated risk. Compromise could result in intellectual property theft, disruption of critical services, and potential exposure of confidential customer or business data. Additionally, the malware’s evasion techniques and updater mechanism complicate detection and remediation efforts, increasing dwell time and potential damage. The use of legitimate-looking applications as infection vectors may also undermine user trust and complicate incident response. Given the increasing adoption of macOS in enterprise environments across Europe, the threat could impact sectors such as finance, technology, telecommunications, and government agencies, where secure remote access tools are prevalent.
Mitigation Recommendations
To mitigate this threat effectively, European organizations should implement a multi-layered defense strategy tailored to the specifics of this campaign: 1) Enforce strict application whitelisting policies to prevent execution of unauthorized or trojanized applications, especially for critical tools like SSH clients. 2) Verify the integrity and authenticity of software downloads by using official sources and validating digital signatures before installation. 3) Deploy endpoint detection and response (EDR) solutions with capabilities to detect anomalous LaunchDaemon creations, suspicious helper app modifications, and unusual network communications to known malicious domains. 4) Monitor network traffic for connections to the identified C2 domains (e.g., ctl01.macnavicat.com, ctl01.termius.fun) and block or alert on such communications. 5) Educate developers and IT staff on the risks of installing software from untrusted sources and encourage the use of managed software deployment tools. 6) Implement robust logging and monitoring of system processes and file changes, focusing on md5 hash changes indicative of updater mechanisms. 7) Regularly audit macOS systems for persistence mechanisms such as LaunchDaemons and unauthorized helper app modifications. 8) Employ network segmentation to limit the lateral movement potential of compromised endpoints. 9) Maintain up-to-date backups and incident response plans tailored to macOS environments to enable rapid recovery if infection occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.sentinelone.com/blog/macos-zuru-resurfaces-modified-khepri-c2-hides-inside-doctored-termius-app"]
- Adversary
- null
- Pulse Id
- 686ffe0e4f96bdedcb713829
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hasha7a9b0f8cc1c89f5c195af74ce3add74733b15c0 | — | |
hashace81626924c34dfbcd9a485437cbb604e184426 | — | |
hashde8aca685871ade8a75e4614ada219025e2d6fd7 | — | |
hashfa9b89d4eb4d47d34f0f366750d55603813097c1 | — |
Domain
Value | Description | Copy |
---|---|---|
domainctl01.macnavicat.com | — | |
domainctl01.termius.fun | — | |
domaindownload.finalshell.cc | — | |
domaindownload.termius.info | — |
Threat ID: 687006eaa83201eaaca92a46
Added to database: 7/10/2025, 6:31:06 PM
Last enriched: 7/10/2025, 6:46:44 PM
Last updated: 7/11/2025, 4:17:45 AM
Views: 3
Related Threats
Attackers Inject Code into WordPress Theme to Redirect Visitors
MediumPatch, track, repeat
MediumDeploying NetSupport RAT via WordPress & ClickFix
MediumAnalysis of APT-C-55 (Kimsuky) Organization's HappyDoor Backdoor Attack Based on VMP Strong Shell
MediumAtomic macOS Stealer includes a backdoor for persistent access
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.