Nowy Trojan na Mac OS X

OXYGEN THIEF

Bardzo aktywny
Członek Załogi
Administrator
Dołączył
26 Maj 2010
Posty
42300
Reakcje/Polubienia
29997
Miasto
Trololololo
Oy88C.jpg

We've come across a fake FlashPlayer.pkg installer for Mac:
Once installed, the trojan adds entries to the hosts file to hijack users visiting various Google sites (e.g., Google.com.tw, Google.com.tl, et cetera) to the IP address 91.224.160.26, which is located in Netherlands.

The server at the IP address displays a fake webpage designed to appear similar to the legitimate Google site.

As an example, this is what Google.com.tw looks like on a normal, uninfected system:
trojan_bash_qhost_wb_google_tw_clean.jpg

In contrast, this is what Google.com.tw looks like on an infected system:
trojan_bash_qhost_wb_google_tw_infected_system.jpg

When a search request is entered, the remote server returns a fake page that mimics a legitimate Google search results page.

Here's a search request on the real Google.com.tw site on a clean system:
trojan_bash_qhost_wb_google_tw_clean_searches.jpg

And here's the same request on an infected system:
trojan_bash_qhost_wb_google_tw_infected_system_searches.jpg


Even though the page looks fairly realistic, clicking on any of the links does not take the user to any other sites. Clicking on the links does however open new pop-up pages, which are all pulled from a separate remote server:
trojan_bash_qhost_wb_google_tw_infected_system_search_source.jpg

At the time of writing, the pop-up pages aren't displaying anything, though we presume they are ads of some sort. It appears that the remote server serving the pop-up pages is down.

The other remote server returning fake search requests appears to be still active.

We detect this trojan as Trojan:BASH/QHost.WB.

Analysis by — Brod
Zaloguj lub Zarejestruj się aby zobaczyć!
 
Do góry