TrojanSpy.MacOS.AMOS.A
Trojan:MacOS/Amos.D!MTB (MICROSOFT)
Windows
Tipo de grayware:
Trojan Spy
Destrutivo:
Não
Criptografado:
In the Wild:
Sim
Visão geral
It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Detalhes técnicos
Übertragungsdetails
It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Andere Details
Es macht Folgendes:
- Upon execution, it prompts a fake warning alert asking for user’s password to lure the victim into inputting the password using osascript command, this password will be used to access the user’s keychain database – this is where sensitive information is stored such as passwords, certificates, and wallet information.
- osascript -e 'display dialog "macOS needs to access System settings %s Please enter your password." with title "System Preferences" with icon file "System:Library:CoreServices:CoreTypes.bundle:Contents:Resources:ToolbarAdvanced.icns" default answer "" giving up after 30 with hidden answer
- It executes the following commands:
- system_profiler SPHardwareDataType → used to gather hardware information from the victim’s machine
- security 2>&1 > /dev/null find-generic-password -ga 'Chrome' | awk '{print $2}' → used to steal Chrome password
- Target browsers:
- Chrome
- Brave
- Edge
- Vivaldi
- Opera
- OperaGX
- Chromium
- Target wallets:
- Exodus
- Electrum
- TronLink
- Metamask
- Binance Chain
- Keplr
Solução
Durchsuchen Sie Ihren Computer mit Ihrem Trend Micro Produkt, und löschen Sie Dateien, die als TrojanSpy.MacOS.AMOS.A entdeckt werden. Falls die entdeckten Dateien bereits von Ihrem Trend Micro Produkt gesäubert, gelöscht oder in Quarantäne verschoben wurden, sind keine weiteren Schritte erforderlich. Dateien in Quarantäne können einfach gelöscht werden. Auf dieser Knowledge-Base-Seite finden Sie weitere Informationen.
Participe da nossa pesquisa!