-
All replies
-
Helpful answers
-
Apr 4, 2012 12:22 PM in response to Matt Durbenby MadMacs0,Matt Durben wrote:
2. Does the trojan itself changes the url it connects to? Or does it come with one fixed url?
The bottom half of this blog from F-Secure Mac Flashback Exploiting Unpatched Java Vulnerability explains how all that works.
-
Apr 4, 2012 12:41 PM in response to MadMacs0by Matt Durben,... This in effect will inject binary2 into every application launched by the infected user. ...
Means every application is infected? Even after deleting the files according to f.secure?
-
Apr 4, 2012 12:44 PM in response to chadonlineby Matt Durben,The malware then creates a launch point by creating "~/.MacOSX/environment.plist", containing the following lines:
- <key>DYLD_INSERT_LIBRARIES</key>
<string>/Users/Shared/.libgmalloc.dylib</string>
For some reason I didn't had a environment.plist even if I'm infection type 2
- <key>DYLD_INSERT_LIBRARIES</key>
-
Apr 4, 2012 12:54 PM in response to Matt Durbenby MadMacs0,Matt Durben wrote:
... This in effect will inject binary2 into every application launched by the infected user. ...
Means every application is infected? Even after deleting the files according to f.secure?
No, it injects the code into RAM after the app is launched, not onto the hard drive.
-
Apr 4, 2012 12:56 PM in response to Matt Durbenby MadMacs0,Matt Durben wrote:
The malware then creates a launch point by creating "~/.MacOSX/environment.plist", containing the following lines:
- <key>DYLD_INSERT_LIBRARIES</key>
<string>/Users/Shared/.libgmalloc.dylib</string>
For some reason I didn't had a environment.plist even if I'm infection type 2
One of us is confused. In this entry Re: .rserv wants to connect to cuojshtbohnt.com you told us you did have it.
- <key>DYLD_INSERT_LIBRARIES</key>
-
Apr 4, 2012 1:07 PM in response to MadMacs0by Matt Durben,I haven't had the ~/.MacOSX/environment.plist
-
Apr 4, 2012 1:09 PM in response to Matt Durbenby lytic,Matt Durben wrote:
1. I thought Creation Date: 03-apr-2012 means first registered date ever. And there's no history but this entry.
2. Does the trojan itself changes the url it connects to? Or does it come with one fixed url?
Three domains names that I mention before, registered by us. This helped us to estimate size of botnet.
Each subversion of BackDoor.Flashback.39 generates a list of C&C servers (about 50-60). We registered first server in list. Here second server according to subversion:
1 - vxvhwcixcxqxd.net
2 - cuojshtbohnt.net
4 - rfffnahfiywyd.net
LysaM, it's not registered yet.
-
Apr 4, 2012 1:16 PM in response to Matt Durbenby MadMacs0,Matt Durben wrote:
I haven't had the ~/.MacOSX/environment.plist
Then how were you able to read it?
Matt Durben wrote:
defaults read ~/.MacOSX/environment
{
"DYLD_INSERT_LIBRARIES" = "/Users/Shared/.libgmalloc.dylib";
}
means I'm infected?
There's a 406kB .libgmalloc.dylib in the specified folder.
What exatly does this trojan? Unfortunately I installed Little Snitch few days after a strange program wants to have my password to install something. I declined, but from what I read that does not matter?!
It had to have been there at the time.
-
Apr 4, 2012 1:20 PM in response to MadMacs0by Matt Durben,Ah,
defaults read ~/.MacOSX/environment
{
"DYLD_INSERT_LIBRARIES" = "/Users/Shared/.libgmalloc.dylib";
}
was a Quote from f-secure
-
Apr 4, 2012 2:42 PM in response to foodguylargoby foodguylargo,New JAVA update from Apple released today... Check software updates!
-
Apr 4, 2012 2:56 PM in response to foodguylargoby MadMacs0,foodguylargo wrote:
New JAVA update from Apple released today... Check software updates!
That's yesterday's news, right?
-
Apr 4, 2012 3:10 PM in response to foodguylargoby HACKINT0SH,I don't know if he's out of date, or if that means 2 updates already. Someone please confirm.
-
Apr 5, 2012 2:56 AM in response to chadonlineby MadMacs0,I'm sure we are all glad that so many folks with Little Snitch survived the attacks this weekend and that Apple has closed one of the doors on this thing, but for anybody that still feels this was no big deal, according to this article http://news.cnet.com/8301-1009_3-57409619-83/ there are still over half a million Macs still Flashback infected (including 274 just down the street from where I sit), so I suspect our work has only begun here.
-
Apr 5, 2012 7:44 AM in response to MadMacs0by WZZZ,Mad, I've asked you this in the Leopard forum already, so sorry for the duplication. Do you know if ClamX has got this thing covered, at least for the known variants through yesterday or the day before, perhaps?
I've got my son a bit worried now. I gave him all the places I know about to check and he comes up clean, but I may not know them all, so thought it might be wise to run an AV.
If not, do you know -- or anyone else, maybe -- if Intego's VirusBarrier X6, the demo version, will scan properly for this? I know they are claiming the full version, at least, can.
-
Apr 5, 2012 8:22 AM in response to nosoloeby nosoloe,Well, I wasn't going to reinstall my system, but now I'm seeing this "music manager" window pop up/under. It comes up for about 5 seconds and disappears. The window looks like a recently downloaded app window with Google's music manager. I do have music manager installed, but I downloaded that a long time ago. This has been a little frustrating to say the least.