OSX_FRUITFLY.MANP
July 28, 2017
ALIASES:
HEUR:Backdoor.OSX.Pentil.b (Kaspersky); OSX/FruitFly.F (ESET-NOD32)
PLATFORM:
Mac OS
OVERALL RISK RATING:
DAMAGE POTENTIAL:
DISTRIBUTION POTENTIAL:
REPORTED INFECTION:
INFORMATION EXPOSURE:

Threat Type: Backdoor
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
This Backdoor executes commands from a remote malicious user, effectively compromising the affected system.
TECHNICAL DETAILS
File Size:
18992 bytes
File Type:
Mach-O
Memory Resident:
Yes
Initial Samples Received Date:
27 Jul 2017
Payload:
Executes commands
Backdoor Routine
This Backdoor executes the following commands from a remote malicious user:
- Simulate keypress
- Simulate mouse click
- Change mouse position / Get Mouse position
- Get Screen size
- Screen capture
SOLUTION
Minimum Scan Engine:
9.850
VSAPI OPR PATTERN File:
1.212.00
Scan your computer with your Trend Micro product to delete files detected as OSX_FRUITFLY.MANP. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
Did this description help? Tell us how we did.