Iru Threat Intelligence

AppleJeus

Written by Iru Team | Nov 25, 2025 8:36:05 PM

AppleJeus is a sophisticated macOS trojan attributed to North Korea's state-sponsored APT Lazarus Group. This malware has been used for years to infiltrate cryptocurrency exchanges and financial service companies by masquerading as legitimate applications. AppleJeus enables unauthorized access, facilitates data exfiltration, and can lead to significant financial losses.

Symptoms

You might observe the following artifacts associated with this threat:

  • Installation of unrecognized cryptocurrency trading applications from unfamiliar sources.
  • Unexpected network connections to unknown servers.
  • Unusual system behavior or unexpected financial transactions.
  • Detection of another malware, FALLCHILL RAT.

Technical Breakdown

AppleJeus is typically distributed through websites that appear to host legitimate cryptocurrency trading platforms. Unsuspecting users are tricked into downloading and installing these weaponized application. Upon execution, the malware hs the capabilities to perform the following actions:

  • Establish Persistence: The malware installs components that ensure it remains active on the system across reboots.
  • Communicates with Command and Control (C2) Servers: AppleJeus connects to attacker-controlled servers to exfiltrate data and download additional payloads.
  • Exfiltrates Data: The malware can collect and transmit sensitive information, including login credentials and financial data.

Multiple versions of AppleJeus have been identified, each with varying levels of sophistication and infiltration techniques.

Next Steps

Kandji Endpoint Detection & Response (EDR) automatically removes detected threats when file monitoring is set to Protect.

While the malicious file is removed, it can leave behind artifacts that need to be cleaned manually.

In the future, avoid downloading and installing software from torrent sources or untrusted websites. Ensure that all applications are obtained from official and reputable sources to maintain system integrity and security.