- Threat Encyclopedia
- Malware
- OSX_IMULER.A
Mac OS
This backdoor may be downloaded by other malware/grayware from remote sites.
102,400 bytes
ELF
Yes
23 Sep 2011
Arrival Details
This backdoor may be downloaded by the following malware/grayware from remote sites:
Installation
This backdoor drops the following files:
It drops the following copies of itself into the affected system:
NOTES:
This backdoor attempts to connect to its command and control (C&C) server www.{BLOCKED}akan.org. If the connection is successful, it may perform the following:
Currently, the said server is inaccessible.
9.200
Step 1
Remove the malware/grayware file that dropped/downloaded OSX_IMULER.A
Step 2
Restart in normal mode and scan your computer with your Trend Micro product for files detected as OSX_IMULER.A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.
NOTES:
Note: Follow this step after removing the related malware:
Terminating Malware Process