You can make a difference in the Apple Support Community!

When you sign up with your Apple Account, you can provide valuable feedback to other community members by upvoting helpful replies and User Tips.

Looks like no one’s replied in a while. To start the conversation again, simply ask a new question.

.rserv wants to connect to cuojshtbohnt.com

I have the message:


.rserv wants to connect to cuojshtbohnt.com


what is .rserv? I googled it and couldn't locate anything ligitimate.


thanks

MacBook Pro, Mac OS X (10.6.8)

Posted on Mar 31, 2012 3:18 PM

Reply
Question marked as Top-ranking reply

Posted on Mar 31, 2012 6:21 PM

I have the same thing happening. Isn't it odd that it's on the same day? Google it now and every entry is from today, within the last 2 hours.


😮


I'll do a text level search of the whole drive and report back if I find something.


GL

228 replies

Apr 1, 2012 6:14 PM in response to MadMacs0

MadMacs0 wrote:


Was this on a fully patched OS X (and what version, BTW) or did it use Java exploit CVE-2011-3544 to install the Type 2 infection? I've asked F-Secure about this, but they have not gotten back to me.


When I described the F-Secure described "Type 2" behavior that I was able to evoke from this threat,I referred to a mostly-patched 10.6.8v1.1 machine. Java there was 1.6.0_29. The only missing patches were the most recent Safari and iTunes updates.

Apr 1, 2012 6:18 PM in response to foodguylargo

foodguylargo wrote:


ditto.


I found this thread after a google seach for .mkeeper turned up nothing and searched the cuojshtbohnt.com domain.


what should I do? I am not very mac smart but have little snitch!

Sorry, this thread has pretty much wound down and concerns a process called ".rserv". Are you reporting a new process called ".mkeeper" also attempting to contact cuojshtbohnt.com? Is this new process located somewhere in your home folder? (It's invisible, so you may not be able to see it in the Finder). Need a few more details or maybe it's time for a new thread as this one is fairly disorganized.

Apr 1, 2012 6:24 PM in response to MWMWMW

MWMWMW wrote:


MadMacs0 wrote:


Was this on a fully patched OS X (and what version, BTW) or did it use Java exploit CVE-2011-3544 to install the Type 2 infection? I've asked F-Secure about this, but they have not gotten back to me.


When I described the F-Secure described "Type 2" behavior that I was able to evoke from this threat,I referred to a mostly-patched 10.6.8v1.1 machine. Java there was 1.6.0_29. The only missing patches were the most recent Safari and iTunes updates.

That's what I thought you were saying. So you were able to infect that machine by simply visiting the web page and canceling the Software Upgrade dialog requesting your admin password. That certainly sounds like the behavior demonstrated by a "V-word" malware. Don't want to panic anybody yet, but that sounds pretty serious. I think most of us have thought the only way infection could be accomplished was with out-of-date Java or social engineering.

Apr 1, 2012 6:32 PM in response to foodguylargo

I did some more digging in my situation.


.mkeeper file was installed at 1:00pm


Right at 1:00 I visited sourceforge and downloaded/installed "paintbrush"


There is no question that I got this from either sourceforge or the paintbrush download.



Hope this can maybe shed some light on the .rserv issue too.... seeing as they're trying to go to the same odd domain.

Apr 1, 2012 6:32 PM in response to foodguylargo

foodguylargo wrote:


correct. .mkeeper that is invisable in my home folder is trying to contact that same domain.

My assumption would be that it's the same thing; just the process name is different, which is not entirely surprising. See also this thread.


<Entered password, concerned about hacking>


MadMacs0 wrote:


Sorry, this thread has pretty much wound down and concerns a process called ".rserv". Are you reporting a new process called ".mkeeper" also attempting to contact cuojshtbohnt.com?

I don't think we should be too strict on process and file names. What it does and how it does it is more important; as we've seen previously, the actual names can be more or less random. Any executable, especially an invisible one, in one's Home directory, and that one don't know about and didn't put there must be highly suspect.

Apr 1, 2012 6:44 PM in response to chadonline

Wrapping up a loose end here, I did join the party a few hours late here yesterday, but have never been able to locate a "cuojshtbohnt.com" using any network utility I have and I whois.com says I can own it for less than $10US. That could be just a test for Little Snitch.


"gangstaparadise.rr.nu" is a different story. It comes back to 67.208.74.71 and Google has several references to rr.nu domains as being malware distributors. None of my whois checks tell me anything about the site or even rr.nu. In any case, this IP address is not the C&C server that has been associated with all of the Flashback Trojans, as near as I can tell. It could have easily moved, of course, but it could also mean this is a Flashback clone as fane_j and others have theorized.

Apr 1, 2012 7:19 PM in response to foodguylargo

foodguylargo wrote:


Right at 1:00 I visited sourceforge and downloaded/installed "paintbrush"


There is no question that I got this from either sourceforge or the paintbrush download.

The Flashback model we've been dealing with over the last month or so involves a drive-by rendering of a Java applet which installs a Trojan Downloader in a temp directory, downloads and installs the components using either one of two Java exploit that were patched by Apple in Nov 2011 or social engineering (the request for admin password you saw). The version from mid-March or so installed two different types of types of Trojan, depending on whether or not it had an admin password.


At least one other Trojan started using this same model, but it apparently came from China and was targetted on Tibet.


I looked around the sourceforge download site (since I'm on a PPC Mac with Java off) and don't see any signs of poisoning, but I probably don't know what I'm looking for since it's never been described. I also downloaded Paintbrush, which comes as a zipped application with no installer and will poke around inside, but probably not try to run it.


In the meanwhile, take a look in your ~/Library/LaunchAgents/ directory (folder) and see if you can find the .plist responsible for launching and maintaining the .mkeeper process. A text editor or QuickLook should be all you need for that.


Then open up Java Preferences (found in /Applications/Utilities/) and tell us what version of Java you have. Since you are posting to the Snow Leopard forum I'm guessing it should be J2SE 6.0 version 1.6.0_29... if it's up-to-date.

Apr 1, 2012 7:33 PM in response to MadMacs0

I found this in ~/Library/LaunchAgents/com.adobe.reader.plist

Note the reference to the .rserv file.


<?xml version="1.0" encoding="UTF-8"?>

<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"><plist version="1.0"><dict><key>Label</key><string>com.adobe.reader</string><key>Progr amArguments</key><array><string>/Users/[my username]/.rserv</string></array><key>RunAtLoad</key><true/><key>StartInterval</key><integer>421 2</integer><key>StandardErrorPath</key><string>/dev/null</string><key>StandardOu tPath</key><string>/dev/null</string></dict></plist>

Apr 1, 2012 7:57 PM in response to foodguylargo

foodguylargo wrote:


There is no question that I got this from either sourceforge or the paintbrush download.

I shouldn't be quite so positive. It may have been earlier. Check messages in Console as here


<https://discussions.apple.com/thread/3844172?answerId=18010355022#18010355022>


Try filtering for the string 'mkeeper', and then check immediately previous and succeeding messages.

Nothing in my /LaunchAgents

Look in <~/Library/LaunchAgents/>. If you don't find it, get EasyFind and search contents of plist files for the string "mkeeper".

Apr 1, 2012 8:10 PM in response to X423424X

Gotcha. Found it:


<?xml version="1.0" encoding="UTF-8"?>

<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd"><plist version="1.0"><dict><key>Label</key><string>com.zeobit.keep</string><key>Progra mArguments</key><array><string>/Users/foodguy/.mkeeper</string></array><key>RunA tLoad</key><true/><key>StartInterval</key><integer>4212</integer><key>StandardEr rorPath</key><string>/dev/null</string><key>StandardOutPath</key><string>/dev/nu ll</string></dict></plist>



Zeobit... Checked their website (MacKeeper) I don't have any of those products, nor have I ever installed any (manually).


This plist was also created at 1:00pm today. The exact time I went to sourceforge/paintbrush (firefox history) That is the only thing I was doing around then. I both went to the site (from a google search) and installed it both at exactly 1pm, so don't know which it was.



The console has no mention of .mkeeper other than:


4/1/12 9:57:38.807 PM com.apple.launchd.peruser.501: (com.zeobit.keep[161]) posix_spawn("/Users/foodguy/.mkeeper", ...): No such file or directory


(I moved and renamed it)

.rserv wants to connect to cuojshtbohnt.com

Welcome to Apple Support Community
A forum where Apple customers help each other with their products. Get started with your Apple Account.