Case Studies

Apple iOS Distribution Certificate Used to Sign Windows Malware

An Apple iPhone Distribution certificate was used to sign more than 225 Windows malware samples over a 13-month period. The campaign spans njRAT, information stealers, worms, BYOVD kernel loaders, and ransomware-adjacent tooling.

February 12, 202610 min read
Illustration showing a Windows executable connected through a trust chain to an Apple iOS distribution certificate, highlighting abuse of trusted signing and policy mismatch.

Why This Caught Our Attention

Code signing is one of the most widely misunderstood trust signals in endpoint security.

For many defenders, "signed" implicitly means safer, reviewed, or at least less suspicious. In practice, signatures are far more nuanced: they describe who attests to a file's integrity -- not whether that attestation should be trusted in a given context or under a given policy.

During routine malware analysis, we encountered a Windows PE32+ executable that illustrated this gap perfectly. The file was signed -- but the signer was not who you would expect.

Instead of a Windows code-signing identity, the leaf signer was an Apple iPhone Distribution certificate:

Subject: iPhone Distribution: Jafar Sakhar (Team ID J4FUC525X9)

Issuer: Apple Worldwide Developer Relations Certification Authority

That mismatch is the focus of this blog.

What We Observed (And Why It's Not "Just One Sample")

The first sample was weird. The second was concerning. By the hundredth, the pattern was undeniable.

By pivoting on the Apple Team ID J4FUC525X9, we linked approximately 225 Windows PE samples signed with the same Apple iOS distribution identity. More importantly: those samples weren't all the same "thing."

This signing identity is being used across a broad malware ecosystem - from commodity RATs, to stealers, to self-replicating worms, to kernel driver loaders, to ransomware-adjacent destructive tooling.

That's the "not normal" part: it's not one operator accidentally doing something odd. It looks operational.

Campaign At A Glance

MetricValue
Total samples~225 unique Windows PE files
Certificate subjectiPhone Distribution: Jafar Sakhar (J4FUC525X9)
Active periodDecember 2024 -- January 2026 (13+ months)
Malware categories6 distinct families
Named families confirmednjRAT, Exela Stealer, Mofksys, Clipbanker
Detection range0/77 to 64/77 across AV engines
Avg detection rate at upload~30% (70% of AV products missed these)

What Windows Does With This Signature (And Why It Still Matters)

Windows behaves correctly.

Using Microsoft tooling (Get-AuthenticodeSignature, signtool, and WinVerifyTrust validation), we confirmed:

  • The file contains an Authenticode signature (PKCS#7 is parseable)
  • The signer identity is visible and attributable
  • Timestamping is present (a valid DigiCert timestamp chain exists)

But Windows fails trust validation with WinVerifyTrust error 0x800B010A:

"A certificate chain could not be built to a trusted root authority."

In plain terms:

CheckResult
File is signedYes
Windows can parse and display signerYes
Windows trusts it as a Windows publisherNo

So why is this still interesting? Because in the real world, humans and pipelines routinely treat "signed" as a shortcut -- especially under triage pressure.

Normal Signing Chain vs. This Campaign

The campaign signing chain vs Normal Windows Signing Chain

Signed Is Not Trusted: The Three Things Defenders Conflate

This campaign cleanly illustrates three concepts being mistaken for one:

Signature presence is often confused as signature parsing which is often confused as trust and policy validation
ConceptWhat It MeansThis Campaign
Signature presenceA cryptographic signature existsYes - PKCS#7 blob present
Signature parsingThe system can show signer metadataYes - "iPhone Distribution: Jafar Sakhar"
Trust & policy validationThe system decides whether the signer should be trustedNo - 0x800B010A error

The cryptography isn't broken. The trust interpretation is.

Okay, But Where's The Malware?

This isn't a niche curiosity. Across representative samples analyzed via on VirusTotal with multi-sandbox behavioral analysis, we confirmed at least six distinct malware categories signed with this same iOS identity.

Malware Ecosystem Overview

Pie chart showing estimated malware campaign categories by sample count, including Information Stealers (20%), RATs/Remote Access tools (18%), Game Cheat Loaders (22%), Worms/Spreaders (13%), Kernel Driver Loaders (9%), Clipbankers & Crypto Theft (7%), Unknown/0-Detection (7%), and Ransomware-Adjacent activity (4%).

Category 1: Information Stealers

Impact: HIGH -- credential theft, financial loss, identity compromise

Stealers in this set harvest credentials, cookies, Discord tokens, screenshots, clipboard contents, and system identifiers, with observed exfiltration to services like Discord webhooks and GoFile.

Named family: Exela Stealer (confirmed with 100% sandbox confidence)

The Exela sample (03a35f49..., 76 MB PyInstaller bundle) triggered 30 Sigma rules in sandbox -- 1 CRITICAL, 7 HIGH, 15 MEDIUM, 7 LOW. The full attack chain:

StageTechniqueDetail
ReconSystem profilingwmic csproduct get uuid, systeminfo, hostname, net user
AV EvasionProduct enumerationwmic /product get firewall/antivirus
CaptureScreenshotsBase64-encoded PowerShell using CopyFromScreen
StealCredentialsBrowser profile enumeration across all installed browsers
StealClipboardGet-Clipboard cmdlet monitoring
PersistStartup folderFile write + attrib +h +s to hide
EscalateAccount manipulationnet user administrator /active:yes
ExfiltrateUpload stolen dataapi.gofile.io, discord.com webhooks
Anti-forensicsDynamic compilationmshta.exe JavaScript execution, csc.exe

Exela Stealer is an open-source Python stealer framework. Its presence shows this certificate is being used by the broader stealer-as-a-service ecosystem.

Category 2: RATs / Remote Access Tooling

Impact: HIGH -- persistent remote control, payload staging, lateral movement

Named family: njRAT (Bladabindi) (confirmed by 6 separate YARA rules)

The earliest sample in the campaign -- Server.exe (8d8e05dd..., 101 KB, December 30, 2024) -- is a textbook njRAT payload:

Evidence TypeDetail
YARA matchesNjrat, MALWARE_Win_NjRAT, Multifamily_RAT_Detection, crimeware_njrat_strings + 2 more
Sandbox verdictsCAPE: njrat, VMRay: njRAT.07dDanger, Zenbox: RAT/SPREADER/EVADER
AV namesMicrosoft: Backdoor:MSIL/Bladabindi!rfn, Kaspersky: HEUR:Trojan.Win32.Generic
CapabilitiesKeylogging, clipboard monitoring, USB enumeration, firewall modification

njRAT is one of the most widely deployed commodity RATs globally. Finding it signed with this iOS cert means the signing service is being used by broad crimeware operators, not a single niche actor.

Category 3: Kernel Driver Loaders (Most Dangerous)

Impact: CRITICAL -- ring-0 execution, EDR/AV bypass, rootkit enablement

This is where the campaign crosses into "dangerous even for hardened endpoints.

SoulwareFREE240.exe (dcb76db8..., 23.4 MB) captures a complete Bring Your Own Vulnerable Driver (BYOVD) attack chain:

Flowchart illustrating a malware execution chain. A file named SoulwareFREE240.exe (iOS-signed) extracts files into a temporary AppData folder, including kdmapper.exe (kernel driver loader), an unsigned driver.sys, and soulware.exe (game cheat payload). The loader exploits the vulnerable Intel driver iQVW64.SYS (CVE-2015-2291) to load the unsigned driver at kernel level (Ring-0), creates a kernel service via the Windows registry, executes the payload with kernel-level support, and finally opens a browser pointing to a Telegram channel.

Why this matters: BYOVD is the exact technique used by Lazarus Group (APT38), BlackByte ransomware, AvosLocker, and Cuba ransomware. The same technique used by nation-state actors and ransomware gangs is being distributed to gamers via this iOS-signed certificate.

The dropped iQVW64.SYS is the Intel Ethernet Diagnostics Driver (CVE-2015-2291) -- a well-known BYOVD target.


Category 4: Worms / Spreaders

Impact: MEDIUM-HIGH -- self-replication, network-wide compromise from single execution

Named family: Mofksys (confirmed by Zenbox at 68-92% confidence across samples)

TJprojMain.exe variants contain a ~270 KB VB-based worm wrapped in a 13-22 MB container. The self-replication chain:

Gemini said Flowchart detailing the execution chain of the Mofksys worm, showing how the main executable (TJprojMain.exe) drops files into the Windows Themes folder, spawns fake system processes (explorer, spoolsv, svchost), establishes RunOnce registry persistence, hides malicious files by disabling ShowSuperHidden, and schedules persistent system processes.

Sigma rules triggered: 1 CRITICAL ("Schedule system process"), 3 HIGH (svchost masquerading, system file anomaly, suspect svchost activity). AV classifications: Kaspersky Virus.Win32.VB.mz, Microsoft Worm:Win32/Mofksys.RND!MTB.

A single execution can compromise an entire network.


Category 5: Ransomware-Adjacent / Destructive Tools

Impact: HIGH -- backup destruction, recovery disablement, service tampering

While not confirmed ransomware (no encryption observed), some samples execute the exact same pre-encryption playbook used by every major ransomware family:

TechniqueCommand ObservedPurpose
Force safe bootbcdedit /set {default} safeboot minimalPrevent normal boot recovery
Disable recoveryreagentc.exe /disableRemove Windows Recovery option
Delete backupswbadmin deleteDestroy restore points
Disable servicesStop wbengine, wuauserv, wscsvcKill backup engine, Windows Update, Security Center
Hide filesattrib +h +s on malicious filesConceal from users

One sample (loader.exe, 17f4d45c...) matched YARA rule INDICATOR_SUSPICIOUS_USNDeleteJournal: "Detects executables containing anti-forensic artifacts of deleting USN change journal. Observed in ransomware."

Category 6: Cryptocurrency Clipbankers

Impact: MEDIUM -- direct financial theft via clipboard hijacking

Named family: Clipbanker (Kaspersky: HEUR:Trojan-Banker.Win32.Clipbanker.b)

Runtime Broker.exe (852ff4f0..., 11 MB, Themida-packed) monitors the clipboard for cryptocurrency wallet addresses and silently replaces them with attacker-controlled addresses. Persistence via CurrentVersion\Run\Update64.


Infrastructure: Not One Actor, An Ecosystem

The infrastructure behind these samples reveals multiple distinct operations sharing the same signing identity.

The "64th Services" RAT Operation

The most organized cluster. A single threat actor operates a commercial malware distribution pipeline:

A diagram illustrating the 64thservice malware infrastructure, showing the flow from initial distribution at the commercial storefront "64thservice.sellsn.io" to a payload staging area at "64services.netlify.app." This staging server hosts various malicious components, including loaders like "64th_(Service).exe," mappers such as "kdmapper.exe," and DLLs like "cmiv3.dll." The chain concludes with a licensing stage that connects to "keyauth.com" or "keyauth.win" (API v1.1/v1.2) for authentication.

RAT behavioral chain (from multi-sandbox analysis):

  1. VMProtect-unpacked loader executes
  2. AV disabled: powershell -NoProfile -WindowStyle Hidden -Command "Add-MpPreference -ExclusionPath 'C:\'" -- excludes the ENTIRE C: drive from Defender
  3. Persistence: copies to C:\Windows\system32\<random>.exe and masquerades as Microsoft.ServiceHub.exe
  4. License check: contacts keyauth.com / prod.keyauth.com API v1.2
  5. Payload download: fetches additional payloads from 64services.netlify.app based on license tier
  6. Anti-analysis: kills fiddler*, wireshark*, httpdebugger*

The VirusTotal domain report for 64services.netlify.app confirms 6 communicating files and 9 downloadable payloads hosted on the infrastructure.

The "Alexskr" Game Cheat Operation

A separate operator with their own C2 panel:

ComponentDetail
C2 panelalexskr.com.tr/panel/ADMINPANEL/ValorantPc/
Auth APIAuth APIalexskr.com.tr/rauth/api/1.1/ (custom, mimics KeyAuth)
TargetsCall of Duty: MW2019, Valorant
Sample namesMw19Unlocker.exe, MW19 Unlock All.exe, NMLora19.exe

Shared Licensing Infrastructure

KeyAuth (keyauth.win) is a licensing-as-a-service platform used across this campaign. For perspective:

110,861 files on VirusTotal communicate with keyauth.win.

Infrastructure Cross-Reference

 Gemini said A diagram illustrating the connection between a compromised iOS certificate and multiple malware operations. At the top "iOS Certificate Layer," a specific certificate labeled "iPhone Distribution: Jafar Sakhar (J4FUC525X9)" acts as the root for several "Distinct Operations," including 64th Services RAT, Alexskr Game Cheats, Soulware BYOVD, njRAT Deployments, Exela Stealer, and Mofksys Worm. These operations are shown feeding into a "Shared Infrastructure" layer at the bottom, which consists of various backend services such as keyauth.win, 64services.netlify.app, https://www.google.com/search?q=alexskr.com.tr, t.me/SoulwareDev, Discord webhooks, and GoFile.io.

Zero-Detection Samples: What AV Completely Misses

Some of the most concerning samples in this campaign are the ones with no AV engine flags at all.

TzLoaderV6.dll -- 0 out of 73 Detections

PropertyValue
SHA-2569c59c99e92f2489ec5d49e72268cc04708eb7020b99fd955ddd1c7898c2e50a5
Size8.45 MB
Detections0/73 -- every AV engine says CLEAN
Framework.NET 8.0
Name"TzLoaderV6"
Similar filesUIDBypass.dll, PandaAI.dll, PowerPlanSwitcher.dll

This sample uses Google Sheets API, requires .NET 8.0 runtime, and connects to cloud metadata endpoints. The only indicator of malicious intent is the iOS certificate.

The cross-platform certificate anomaly is literally the ONLY machine-readable detection signal. Without that awareness, this sample is invisible.


Detection Distribution Across All 225 Samples

This bar chart, titled "AV Detection Rates at Time of Upload," illustrates the distribution of antivirus detection results for a set of malware samples. The y-axis represents the Number of Samples, while the x-axis categorizes them by the number of antivirus engines that detected them out of 77 total engines. The data shows that 25 samples had 0/77 detections, indicating they were fully undetected at the time of upload, while the most frequent detection range was 6-10/77, containing 40 samples. Other significant clusters include 35 samples in the 11-20/77 range and 15 samples that were highly detected by 51+ engines.

Timeline: This Wasn't A Weekend Experiment

The observed activity spans 13+ months (December 2024 through January 2026), with clear burst upload patterns and long-lived distribution infrastructure.

Gemini said Timeline illustrating the evolution of the Jafar Sakhar threat campaign from 2024 to early 2026, tracking the progression from initial infrastructure and Mofksys worm deployments to the expansion of iOS certificate abuse and sophisticated Soulware BYOVD operations, culminating in a shared malware backend using 64th Services RAT and various cloud-based C2 services.

The "This Is Structural" Part: The Cert Kept Working After Expiration

Samples continued being uploaded after the certificate expired (~August 2025). The reason is straightforward:

  • Windows doesn't reject expired code-signing certs (it marks them with a timestamp warning)
  • The cross-platform nature means iOS revocation has zero effect on Windows
  • AV detection rates didn't improve after expiration

This is a structural gap, not a bug.

Shared Tooling & Packing

The diversity in packing reveals a multi-operator ecosystem:

Packer / FrameworkEst. SamplesTypical SizePurpose
VMProtect~30+13-25 MBCommercial anti-analysis
Themida~1510-15 MBAnti-debugging, anti-VM
PyInstaller~40+40-155 MBPython-to-EXE bundling
.NET (raw)~15+1-2 MBManaged code, easy rebuild
C++ (no packer)~20+100-300 KBKernel tools, small droppers

Anti-Analysis Techniques Observed Across Campaign

TechniqueVT TagPrevalence
Debug environment detectiondetect-debug-environmentMajority of samples
Long sleep periodslong-sleeps~40% of samples
Disk space checkingchecks-disk-space~25%
WMI queries for VM detectioncalls-wmi~20%
Network adapter enumerationchecks-network-adapters~15%
Kill analysis toolsProcess terminationMultiple RAT clusters
CPU name checkingchecks-cpu-name~10%

Victim Targeting: Gamers As The Canary

The primary targets are clear from filenames, distribution archives, and embedded infrastructure:

Targeted Games & Platforms

Game / PlatformEvidence
Call of Duty: Modern Warfare 2019Mw19Unlocker.exe, MW19 Unlock All.exe, Mw19 Chair V3.exe
ValorantValorantPc admin panel path at alexskr.com.tr
FiveM (GTA V multiplayer)Fivem-External.exe variants (multiple rebuilds)
Generic game cheat suitesSoulwareFREE240.exe, Zenith.rar, PantheonRelease.rar
Game overlay toolsDearImGui references for in-game rendering

Distribution Mechanisms

MethodExamples
Game crack archivescrack.zip, crack.7z
Named cheat suitesSoulware 240 free.zip, PantheonRelease.rar, MasonLite.rar
Social engineering lures266 devblog.rar
Direct download infrastructure64services.netlify.app/Loader/...
Commercial storefront64thservice.sellsn.io
Telegram channelst.me/SoulwareDev

Why gamers matter for enterprise defenders: The gaming cheat ecosystem is a proving ground for malware techniques that later migrate to enterprise attacks. BYOVD was gaming cheat technology before it was an APT technique. This campaign shows the next evolution: cross-platform cert abuse as an evasion layer.


Why This Matters Even Though Windows Doesn't Trust It

This finding isn't interesting because Windows is vulnerable, it isn't.

It's interesting because signature metadata still carries weight in the real world:

  • Triage pipelines that deprioritize "signed" files
  • Detection logic that checks signature presence but not trust outcome
  • Analyst bias toward recognizable issuers
  • Confusion when signatures appear in unexpected contexts

This iOS signer on Windows binaries exploits that gray zone: it doesn't grant Windows trust, but it creates hesitation, ambiguity, and missed prioritization.


Certificate Ecosystem Abuse, Not A Platform Vulnerability

It's important to be explicit about scope:

This is not an Apple OS vulnerability, not a macOS or iOS signing flaw, and not a Windows trust failure.

What we observe is abuse of developer certificate material outside its intended ecosystem. That material may have been fraudulently obtained, compromised post-issuance, or misused in ways the certificate program did not anticipate.

Immediate Defender Guidance

SOC / Analysts: Fast Triage Rule

If you only take one thing from this post:

Windows PE (.exe/.dll/.sys) + "Apple Worldwide Developer Relations" + "iPhone Distribution" = quarantine. No exceptions.

This is a high-confidence anomaly with effectively no legitimate enterprise use case.

Quick Triage Checklist

  • Is it a Windows .exe, .dll, or .sys?
  • Does the signature chain include "Apple Worldwide Developer Relations"?
  • Does the signer contain "iPhone Distribution" or "iPhone Developer"?
  • If all three: quarantine immediately.

CISOs: Policy-Level Takeaway

If your environment has any cultural or technical tendency to treat "signed" as "good," this is your wake-up call:

  1. Update hunting to include signer context, not just signature presence
  2. Brief your SOC that cross-platform signer mismatch is a high-confidence malicious indicator
  3. Review any "allow signed" policies for overly broad trust assumptions

WDAC / Application Control Teams

This campaign is the textbook case for why application control can't be "allow signed stuff":

  • Some WDAC designs that broadly allow on "trusted roots" can be abused in surprising ways
  • Policy engines rarely validate "certificate type makes sense for this platform"
  • Signer context belongs in allow/deny logic, not just analyst mental models

Practical note: A FilePublisher-style block keyed on "Apple Worldwide Developer Relations Certification Authority" for Windows PE would block 100% of this campaign with zero false positives in typical Windows environments.


How To Check (PowerShell)

# Check if a Windows binary is signed with an iOS certificate

$sig = Get-AuthenticodeSignature -FilePath "suspicious.exe"

$sig.SignerCertificate | Format-List Subject, Issuer

# Look for:

#   Subject: CN=iPhone Distribution: ...

#   Issuer:  CN=Apple Worldwide Developer Relations Certification Authority

Indicators of Compromise

Certificate Identity

FieldValue
SubjectiPhone Distribution: Jafar Sakhar (J4FUC525X9)
Team ID / OUJ4FUC525X9
IssuerApple Worldwide Developer Relations Certification Authority
Certificate URLcerts.apple.com/wwdrg3.der

Malicious Infrastructure

DomainPurposeVT Status
64services.netlify.appPayload staging (9 payloads hosted)8/93 malicious
keyauth.com / keyauth.winlicensingWidely abused
alexskr.com.trC2 panel (Valorant/CoD campaigns)Active C2
64thservice.sellsn.ioCommercial malware salesActive storefront
t.me/SoulwareDevDistribution channelActive Telegram

Malicious URLs

URLContent
64services.netlify.app/Loader/64th_(Service).exeMain RAT loader
64services.netlify.app/Loader/4334t3tsefwe.exeObfuscated loader
64services.netlify.app/p45235-main/mapper.exeKernel driver mapper
64services.netlify.app/chat243453-main/kdmapper.exeKernel driver loader
64services.netlify.app/idkrwerwre-main/Microsoft.ServiceHub.exeMasqueraded RAT
alexskr.com.tr/panel/ADMINPANEL/ValorantPc/d.exeGame cheat payload

Exfiltration Destinations

ServicePurpose
discord.com / Discord webhooksToken theft + data exfil
api.gofile.io / store1.gofile.ioStolen data upload
ip-api.com / api.ipify.orgVictim IP fingerprinting

Vulnerable Driver (BYOVD)

DriverCVEHashUsed By
iQVW64.SYS (Intel Ethernet Diagnostics)CVE-2015-2291Available in VTSoulwareFREE240, kdmapper variants

Representative Sample Hashes

SHA-256CategoryNotable
8d8e05dd26a7fd27089810fbcdaf29f23d030a6f8a0bb6ec4be8821986c2fa49njRATOldest sample (Dec 2024), YARA-confirmed
03a35f49b8ccd13cb1f47822cc23b547b01cd8b4f4a0b54d3ec34d6ba2c5b7cfExela Stealer76 MB, 30 Sigma rules triggered
a46bee5cf4a75e8c909a2ba10879e2b50a03c3c314d203c2fb507982ed62f7e0Mofksys Worm64/77 detections, highest in campaign
dcb76db87a9aba556162e1c572ba6b9321bfc422bbffeff8209aaac7e5280098BYOVD LoaderFull kernel exploitation chain
852ff4f0970518ebf1c5e2bbb70574b11c9e52439fa22ab8a7f124614f7c4ba7ClipbankerThemida-packed crypto theft
589b9eba96edd841867325e3334436052632623d9b7669a2556571fb62b7c48c64th Services RATNetlify-staged, VMProtect
9c59c99e92f2489ec5d49e72268cc04708eb7020b99fd955ddd1c7898c2e50a50-Detection Loader0/73 -- invisible to all AV
17f4d45c18620008835af614dc2b050edc98fd9646c234c4a760839197954731Anti-Forensic LoaderUSN journal deletion YARA match

The full list of ~225 sample hashes is available in the companion IOC file.


The "This Should Never Happen" Summary

An Apple iPhone Distribution certificate - designed exclusively to sign iOS apps for the App Store - was weaponized to sign ~225 Windows executables spanning stealers, RATs, worms, kernel driver tooling, clipbankers, and ransomware-adjacent behaviors.

Every one of these binaries presents a valid cryptographic signature blob that Windows can parse and display. And yet, no operating system prompt, no default policy engine, and no common security workflow is built to treat "cross-ecosystem signer mismatch" as the abnormality it is.

This isn't a vulnerability. It's a gap in how the industry thinks about trust.

Access the full IoC dataset and technical appendix here:
https://github.com/magicsword-io/IoCs


Want to keep up with how modern attacks actually work? Subscribe to the MagicSword newsletter for practical research, real-world attack tradecraft, and prevention-focused intelligence from the team tracking abused tools every day.

If you want to see how this intelligence turns into real blocking, stopping abused tools before they execute, you can book a demo here.

Michael Haag

Written by

Michael Haag

Threat Researcher

In the intricate chessboard of cybersecurity, my role oscillates between a master tactician and a relentless hunter. As an expert in detection engineering and threat hunting, I don't just respond to the digital threats, I anticipate them, ensuring that the digital realm remains sovereign.

© 2026 MagicSword. All rights reserved.