[FSec] Trojan:BASH/QHost.WB

Newsfeed

Nachrichtenbote
We come across a fake FlashPlayer.pkg installer for Mac:

trojan_bash_qhost_wb_installer.jpg


Once installed, the trojan add entries to the hosts file to hijack users visiting various Google sites (e.g., Google.com.tw, Google.com.tl, etc) to the IP address 91.224.160.26, which is located in Netherlands.

The server at the IP address displays a fake webpage designed to appear similar to the legitimate Google site.

As an example, this is what Google.com.tw looks like on a normal, uninfected system:

trojan_bash_qhost_wb_google_tw_clean.jpg


In contrast, this is what Google.com.tw looks like on an infected system:

trojan_bash_qhost_wb_google_tw_infected_system.jpg


When a search request is entered, the remote server returns a fake page that mimics a legitimate Google search results page.

Here's a search request on the real Google.com.tw site on a clean system:

trojan_bash_qhost_wb_google_tw_clean_searches.jpg


And here's the same request on an infected system:

trojan_bash_qhost_wb_google_tw_infected_system_searches.jpg


Even though the page looks fairly realistic, clicking on any of the links does not take the user to any other sites. Clicking on the links does however open new pop-up pages, which are all pulled from a separate remote server:

trojan_bash_qhost_wb_google_tw_infected_system_search_source.jpg


At the time of writing, the pop-up pages aren't displaying anything, though we presume they are ads of some sort. It appears that the remote server serving the pop-up pages is down.

The other remote server returning fake search requests appears to be still active.

We detect this trojan as Trojan:BASH/QHost.WB.



-----

Analysis by - Brod




On 01/08/11 At 03:17 AM

Weiterlesen...
 
Zurück
Oben