OSX_IMULER.A

 Analysis by: Erika Bianca Mendoza

 PLATFORM:

Mac OS

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:

  • Threat Type: Backdoor

  • Destructiveness: No

  • Encrypted: No

  • In the wild: Yes

  OVERVIEW


This backdoor may be downloaded by other malware/grayware from remote sites.

  TECHNICAL DETAILS

File Size:

102,400 bytes

File Type:

ELF

Memory Resident:

Yes

Initial Samples Received Date:

23 Sep 2011

Arrival Details

This backdoor may be downloaded by the following malware/grayware from remote sites:

  • OSX_REVIR.A

Installation

This backdoor drops the following files:

  • /users/%User%/library/LaunchAgents/checkvir.plist

It drops the following copies of itself into the affected system:

  • /users/%User%/library/LaunchAgents/checkvir

NOTES:

This backdoor attempts to connect to its command and control (C&C) server www.{BLOCKED}akan.org. If the connection is successful, it may perform the following:

  • Capture screenshots
  • Upload file

Currently, the said server is inaccessible.

  SOLUTION

Minimum Scan Engine:

9.200

Step 1

Remove the malware/grayware file that dropped/downloaded OSX_IMULER.A

    OSX_REVIR.A

Step 2

Restart in normal mode and scan your computer with your Trend Micro product for files detected as OSX_IMULER.A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.

NOTES:

Note: Follow this step after removing the related malware:

Terminating Malware Process

  1. Go to Applications> Utilities> Activity Monitor and terminate the following process using the Quit Process button:
    • checkvir


Did this description help? Tell us how we did.

Related Malware