Difference between revisions of "Tales from Crisis, Chapter 2: Backdoor’s first steps"

From Botnets.fr
Jump to navigation Jump to search
m (1 revision imported)
m (Text replacement - " août " to " aug")
 
Line 3: Line 3:
|Author=osxreverser
|Author=osxreverser
|NomRevue=Reverse Engineering Mac OS X
|NomRevue=Reverse Engineering Mac OS X
|Date=20 août 2012
|Date=20 aug2012
|Editor=Osxreverser
|Editor=Osxreverser
|Year=2012
|Year=2012

Latest revision as of 21:31, 5 August 2015

(Publication) Google search: [1]

Tales from Crisis, Chapter 2: Backdoor’s first steps
Botnet Crisis
Malware
Botnet/malware group
Exploit kits
Services
Feature
Distribution vector
Target
Origin
Campaign
Operation/Working group
Vulnerability
CCProtocol
Date 2012 / 20 aug2012
Editor/Conference Osxreverser
Link http://reverse.put.as/2012/08/20/tales-from-crisis-chapter-2-backdoors-first-steps/ reverse.put.as (reverse.put.as Archive copy)
Author osxreverser
Type

Abstract

The first curious detail about the backdoor module (installed as /Users/USERNAME/Library/Preferences/jlc3V7we.app/IZsROY7X.-MP) is that no obfuscation/anti-debugging tricks are used (except one) so its analysis is easier than the dropper. It also uses Objective-C heavily, which is still a bit annoying in IDA but has the advantage of the code being very descriptive.

Bibtex

 @misc{Lua error: Cannot create process: proc_open(/dev/null): failed to open stream: Operation not permitted2012BFR1126,
   editor = {Osxreverser},
   author = {osxreverser},
   title = {Tales from Crisis, Chapter 2: Backdoor’s first steps},
   date = {20},
   month = Aug,
   year = {2012},
   howpublished = {\url{http://reverse.put.as/2012/08/20/tales-from-crisis-chapter-2-backdoors-first-steps/ reverse.put.as}},
 }