Trojan.MacOS.NUKESPED.YXBBS
Trojan:MacOS/NukeSped.C!MTB(MICROSOFT); Trojan-Downloader.OSX.Nukesped(IKARUS)
OSX
Threat Type: Trojan
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
As of this writing, the said sites are inaccessible.
TECHNICAL DETAILS
79760 bytes
Yes
18 Feb 2021
Arrival Details
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This Trojan drops and executes the following files:
- This file is usually included in a malicious pkg file that has a postinstall script. This file contains the malicious payload of the pkg.
Autostart Technique
This Trojan drops the following files:
- /Library/UnionCrypto/unioncryptoupdater (drops malicious file)
- /Library/LaunchDaemons/vip.unioncrypto.plist
- Note: “vip.unioncrypto.plist” runs “unioncryptoupdater” using the “RunAtLoad” to run the malicious file every time the system is booted. Unioncryptoupdater and vip.unioncrypto.plist are hidden files in the package file
Download Routine
This Trojan accesses the following websites to download files:
- https://{BLOCKED}rypto.vip/update → payload
As of this writing, the said sites are inaccessible.
Other Details
This Trojan does the following:
- Decrypts downloaded payload
- Tries to copy the decrypted payload into memory and execute the payload
- If failed to insert payload into memory, saves downloaded to /tmp/updater
- Will continuously try to repeat the routine every minute
SOLUTION
10.000
1.460.00
04 Dec 2019
1.460.00
28 Jan 2020
Scan your computer with your Trend Micro product to delete files detected as Trojan.MacOS.NUKESPED.YXBBS. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check the following Trend Micro Support pages for more information:
NOTES:
Solution:
To Remove Malicious File:
- click launchpad, then type 'activity monitor'
- once opened, type in the search bar 'unioncryptoupdater'
- double-click the unioncryptoupdater process, then select quit
- then select quit at the opened window.
- click the finder app, in the left select the applications directory, then select the unioncryptotrader app then right-click and select move to trash.
- in finder app, select go>go to folder. then type \Library
- search and select the unioncrypt directory, right-click and select move to trash
- in finder app, select go>go to folder. then type \Library\LaunchDaemons
- search and select the vip.unioncrypto.plist, right-click and select move to trash
- Scan your computer with your Trend Micro product to delete files detected as Trojan.MacOS.APPLEJEUS.YEBB-A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files.
Did this description help? Tell us how we did.