Home / malwarePDF  

IOS.Lastacloud


First posted on 14 December 2014.
Source: Symantec

Aliases :

There are no other names known for IOS.Lastacloud.

Explanation :

The Trojan horse can be installed on jailbroken iOS devices.

When the Trojan is executed, it drops the following file to install itself:
/var/root/Media/Cydia/AutoInstall/d.deb
Note: The file is deleted once the Trojan is installed.

The Trojan creates the following files:
/usr/bin/C/System/Library/LaunchDaemons/com.apple.tor.plist/usr/bin/cores/usr/bin/cores2
The Trojan connects to the following location to check for an internet connection:
www.apple.com
The Trojan may steal the following information from the compromised device:
Address book contentsICCIDPlatform typeNameModelSystem versionFree spaceTotal spaceCPU frequencyCPU countTotal memoryUsed memoryMax socket buffer sizeLocale identifierLanguage display nameDefault time zoneLocal time zonePhone numberCarrier nameCarrier bundle nameISO country nameConnection stateMAC addressContents of /private/var/root/Library/Lockdown/data_ark.plistSafari history
The Trojan connects to a remote server using information from an encrypted configuration file in the following location:
/usr/bin/cores
The encrypted configuration file contains the following information:
ServerUser namePassword
The Trojan may download and install a package in the following location:
/var/root/Media/Cydia/AutoInstall/
The Trojan may download and install a separate package in the following location:
/usr/bin/cores2

Last update 14 December 2014

 

TOP