[FSec] DevilRobber gets an updated version

Newsfeed

Nachrichtenbote
We found an updated version of Backdoor:OSX/DevilRobber, which we posted about earlier.

The updated version uses the same technique as its predecessor to disguise itself as a legitimate application, though this time it calls itself PixelMator.

Screenshot_system_filename.jpg


Based on the malware's dump.txt file, this latest backdoor is identified as Version 3 (v3).

DevilRobber_V3.jpg


The main point of difference in DevilRobberV3 is that it has a different distribution method - the 'traditional' downloader method.

The DevilRobberV3 sample that we analyzed (1c49632744b19d581af3d8e86dabe9de12924d3c) is a FTP downloader that will download its backdoor installer package from an FTP Server service provider.

To retrieve its installer, the malware generates 3 FTP URLs with hard-coded usernames and passwords, which are encoded in the program itself. The package is named "bin.cop" and is stored in the root folder on the FTP server.

DevilRobber_V3_downloader.jpg


In addition to the changed distribution method, DevilRobberV3 has the following changes in its information harvesting script:

• It no longer captures a screenshot
• It no longer checks the existence of LittleSnitch firewall
• It uses a different launch point name
• It harvests the shell command history
• It harvests 1Password contents (a password manager from AgileBits)
• It now also harvests the system log file

It still attempts to obtain Bitcoin wallet contents though.


-----

ThreatSolutions post by - Wayne
On 16/11/11 At 10:39 AM

Weiterlesen...
 
Zurück
Oben