|Published||Apr 09 2012 14:41 GMT|
A family of malware for Mac OS X. The first versions of this type of threat were detected in September 2011. In March 2012 over 600 000 computers worldwide were infected by Flashback. The infected computers were combined in a botnet that enabled cybercriminals to install additional malicious modules on them at will. One of the modules is known to generate fake search engine results, displaying false results for users and generating profits for cybercriminals via ‘click fraud’. It is quite possible that, in addition to intercepting search engine traffic, cybercriminals can upload other malicious modules to infected computers – e.g. for data theft or spam distribution.
A Trojan program that downloads other malicious programs from the Internet and launches them on a victim machine without the user’s knowledge. The program is a Mac OS X (Mach-o) application. It is between 19,384 and 200,876 bytes in size. It is written in C++.
Once launched the Trojan attempts to upload additional malicious modules. Every 24 hours the Trojan tries to connect to 30 sites, generating 5 domain names while a further 25 are contained in the body of the malicious program itself. One of those sites (randomly chosen) hosts the botnet’s C&C server as deployed by the cybercriminals. The domains have names such as:
jobijoolkfip4oasdkf.com ithfmmcoo400dmsddditofdl.com utu9nnmkrogjfldoritvz.com 999rjjfnvmvciwepoqwejdsadkf.com ighrueokdhfcnnsjwwqqllxz.com itgii5fmmjmsppperujvmsdkkff.com jtierodoxzwerkolun.com iruifjckdlfqwexzcnvdkffd.com all-nightmexicansoftstore.com callmetonight911.com oversellingresourcestoday.com fasttrackanddeliverytoyourdoors.com trustedsoftappstore.com fantastischappstore.com megastoreappsstore.com catholicappstorecloud.com bestcatholicianappstoretoday.com onlinesoftstoreofweekend.com knockoutpricesappstoreeveryday.com svupsvc.com ajovgdekxrmw.com ggatocowtonwpn.com wxsrnrskapelhy.com ouspjintgjsrw.comThe Trojan saves the downloaded modules in the following application folders:
/Applications/Safari.app/ /Applications/Firefox.app/ etc.The downloaded files can be encrypted with the victim machine’s UUID. If loaded successfully, the Trojan sends a notification to its owners at the addresses:
http://adobesoftwareupdate.com/counter/ http://220.127.116.11/jcounter/ etc.
Programs classified as Trojan-Downloader download and install new versions of malicious programs, including Trojans and AdWare, on victim computers. Once downloaded from the Internet, the programs are launched or included on a list of programs which will run automatically when the operating system boots up.
Information about the names and locations of the programs which are downloaded are in the Trojan code, or are downloaded by the Trojan from an Internet resource (usually a web page).
This type of malicious program is frequently used in the initial infection of visitors to websites which contain exploits.