Analysis by: Mc Justine De Guzman

 PLATFORM:

OSX

 OVERALL RISK RATING:
 DAMAGE POTENTIAL:
 DISTRIBUTION POTENTIAL:
 REPORTED INFECTION:
 INFORMATION EXPOSURE:

  • Threat Type: Backdoor

  • Destructiveness: No

  • Encrypted:

  • In the wild: Yes

  OVERVIEW

Infection Channel: Downloaded from the Internet

This Backdoor may be unknowingly downloaded by a user while visiting malicious websites.

It executes commands from a remote malicious user, effectively compromising the affected system.

  TECHNICAL DETAILS

File Size: 18,328,260 bytes
Memory Resident: No
Initial Samples Received Date: 06 Jan 2021
Payload: Connects to URLs/IPs

Arrival Details

This Backdoor may be unknowingly downloaded by a user while visiting malicious websites.

Autostart Technique

This Backdoor drops the following files:

  • /Users//.mdworker -> drops itself as hidden
  • /Users//Library/LaunchAgents/mdworker.plist

Backdoor Routine

This Backdoor executes the following commands from a remote malicious user:

  • ExecConsole
  • downloadFile
  • FolderContent
  • killProcessMac
  • getProcessList
  • uploadFile
  • uploadFolder
  • getUserPath

It connects to the following URL(s) to send and receive commands from a remote malicious user:

  • {BLOCKED}.{BLOCKED}.100.140

Other Details

This Backdoor does the following:

  • It connects to the following url to retrieve its C&C:
    • https://pastebin.com/raw/{BLOCKED}d
    • https://pastebin.com/raw/{BLOCKED}7

  SOLUTION

Minimum Scan Engine: 9.800

Scan your computer with your Trend Micro product to delete files detected as Backdoor.MacOS.ELECTRORAT.YABA-A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:


Did this description help? Tell us how we did.