Malware descriptions

New malware for Mac: Backdoor.OSX.Morcut

Yesterday lots of antivirus labs got a sample of the new antivirus program targeting MAC OS X users. This sample named Backdoor.OSX.Morcut was distributed using social engineering techniques via a JAR file with the name AdobeFlashPlayer.jar and allegedly signed by VeriSign Inc.

New malware for Mac: Backdoor.OSX.Morcut

Notification from the JAVA virtual machine about the launch of the untrusted applet

If the user allows the JAR file to run, it creates the executable file payload.exe (993,440 bytes) in a temporary folder ~spawn[selection of numbers].tmp.dir and launches it.

The section of the JAR file code responsible for saving the MAC OS X malicious program on to disk and launching it

Once it is launched, the malicious program initializes its components and passes control to them. The components include:

  1. The installer, the management server communication module (mach-o file for x86, 401,688 bytes in size). It checks for the presence of the autorun file Library/LaunchAgents/com.apple.mdworker.plist and files containing stolen data named *.flg.
  2. Rootkit (mach-o file, driver for x86, 14,724 bytes in size, with the internal name mchook). It is responsible for hiding files and processes in the system
  3. Rootkit (similar to the previous one but for x64).
  4. Spyware (mach-o file for x64, 365,564 bytes in size). Responsible for working with Firefox, Safari, Skype, Adium. Captures keystrokes and the position of the cursor when the mouse is clicked, captures clipboard content, audio streaming and videos on the screen.
  5. Spyware (similar to the previous one but for x86, 93,048 bytes in size).
  6. Autorun file (mach-o file for x64, 24,808 bytes in size). Responsible for module communications.
  7. Autorun file (similar to the previous one but for x86, 24,100 bytes in size).

New malware for Mac: Backdoor.OSX.Morcut

Section of the spy module code used for encrypting stolen data and connecting to the C&C server

Section of the spy module code used for capturing keystrokes and mouse clicks

The functionality of these modules can vary slightly depending on whether the user has administrative rights or not. A request for the user password is not made.

These modules were written professionally, obviously with the intention of being used widely in the future. From the code we can see that the cybercriminals developed this Trojan in order to sell it on hacker forums. It is quite possible that in the near future this Trojan may become another ZeuS in terms of both popularity and the number of botnets.

PS 1. KSN has not yet recorded any infections caused by this malicious program.

PS 2. This malware could be placed not on black market but on white for law enforcement agencies

New malware for Mac: Backdoor.OSX.Morcut

Your email address will not be published. Required fields are marked *

 

Reports

GhostEmperor: From ProxyLogon to kernel mode

While investigating a recent rise of attacks against Exchange servers, we noticed a recurring cluster of activity that appeared in several distinct compromised networks. With a long-standing operation, high profile victims, advanced toolset and no affinity to a known threat actor, we decided to dub the cluster GhostEmperor.

APT trends report Q2 2021

This is our latest summary of advanced persistent threat (APT) activity, focusing on significant events that we observed during Q2 2021: attacks against Microsoft Exchange servers, APT29 and APT31 activities, targeting campaigns, etc.

LuminousMoth APT: Sweeping attacks for the chosen few

We recently came across unusual APT activity that was detected in high volumes, albeit most likely aimed at a few targets of interest. Further analysis revealed that the actor, which we dubbed LuminousMoth, shows an affinity to the HoneyMyte group, otherwise known as Mustang Panda.

Subscribe to our weekly e-mails

The hottest research right in your inbox