Home / malwarePDF  

Backdoor:MacOS_X/Olyx.B


First posted on 11 July 2012.
Source: Microsoft

Aliases :

Backdoor:MacOS_X/Olyx.B is also known as Backdoor.OSX.Lasyr.d (Kaspersky), Backdoor.OSX.Lasyr.a (VirusBuster), MACOS/Lamadai.A (Avira), MAC.OSX.Trojan.Lamadai.A (BitDefender), BackDoor.Lamadai.1 (Dr.Web), OSX/Lamadai.A trojan (ESET), Backdoor.OSX.Olyx (Ikarus), OSX/Olyx (McAfee), OSX/AftDr-B (Sophos), OSX.Olyx (Symantec), OSX_RHINO.AE (Trend Micro).

Explanation :



Backdoor:MacOS_X/Olyx.B is a backdoor trojan that allows an unauthorized user to access and control your computer. It affects computers using the Mac OS X operating system.



Installation

Backdoor:MacOS_X/Olyx.B may copy itself as the following files:

  • ~/Applications/Automator.app/Contents/MacOS/DockLight
  • ~/Library/Audio/Plug-Ins/AudioServer


To make sure it automatically runs, it installs a "Launchd" property list file in the "LaunchAgents" folder as follows:

  • ~/Library/LaunchAgents/com.apple.DockActions.plist


This property list file has the label "com.apple.docserver", and is defined to run at least once when you log in.

Distributed via...

Malicious Word documents

Backdoor:MacOS_X/Olyx.B is embedded in a specially-crafted Microsoft Word for Mac document that exploits a vulnerability. the vulnerability was resolved with the release of Microsoft Security Bulletin MS09-027. The malicious Word document is detected as Exploit:MacOS_X/MS09-027.A.

Java applets

Backdoor:MacOS_X/Olyx.B has also been observed being dropped by other malware that exploit Java vulnerabilities, such as the following:

  • Exploit:Java/CVE-2012-0507
  • Exploit:Java/CVE-2011-3544


Payload

Allows backdoor access and control

Backdoor:MacOS_X/Olyx.B connects to any of the following servers to allow an unauthorized user access to your computer:

  • 2012.slyip.net
  • avira.suroot.com
  • dns.assyra.com
  • mail.hiserviceusa.com


Once connected, Backdoor:MacOS_X/Olyx.B creates a pseudo-terminal. It checks for the name "tty", and may set the environment variable to "HILLSET=F" or "TME=R".

It also performs the following actions:

  • Searches the computer's files and folders
  • Gather information about the computer and send it to the server
  • Send or upload files to the server
  • Open a bash shell command, which allows the unauthorized user to execute commands
Additional resources

More information about this threat is available in the MMPC blog post "Backdoor Olyx - is it malware on a mission for Mac?".



Analysis by Methusela Cebrian Ferrer

Last update 11 July 2012

 

TOP