OSX_MORCUT.A
Mac OS X

Threat Type: Backdoor
Destructiveness: No
Encrypted: No
In the wild: Yes
OVERVIEW
Downloaded from the Internet
This malware uses new technique for its data stealing routine which is utilizing the audio functionality of Mac. It also uses kernel extension as its rootkit component.
To get a one-glance comprehensive view of the behavior of this Backdoor, refer to the Threat Diagram shown below.

This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
It runs certain commands that it receives remotely from a malicious user. Doing this puts the affected computer and information found on the computer at greater risk.
TECHNICAL DETAILS
Varies
Mach-O
Yes
25 Jul 2012
Arrival Details
This backdoor arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites.
Installation
This backdoor creates the following folders:
- /Library/ScriptingAdditions/appleHID (if running as root)
- /Users/{user name}/Library/ScriptingAdditions/appleHID (if not running as root)
Autostart Technique
This backdoor drops the following files:
- /Library/LaunchAgents/com.apple.mdworker.plist (if running as root)
- /Users/{user name}/Library/LaunchAgents/com.apple.mdworker.plist (if not running as root)
Backdoor Routine
This backdoor executes the following command(s) from a remote malicious user:
- Download a file
- Execute a command using /bin/sh
- Record audio
- Scan for network connections
- Search a file
- Uninstall itself
- Upload a file
NOTES:
This backdoor drops the following kernel extensions:
- /Library/ScriptingAdditions/appleHID/Contents/Resources/{random file name}.kext/Contents/MacOS/{random file name} (if running as root)
- /Users/{user name}/Library/ScriptingAdditions/appleHID/Contents/Resources/{random file name}.kext/Contents/MacOS/{random file name} (if not running as root)
The dropped kernel extension is also detected by live casino online as OSX_MORCUT.A. It is used by this malware to hide its created folders and its process.
This backdoor runs on the following OS X platforms:
- 10.5 (Leopard)
- 10.6 (Snow Leopard)
- 10.7 (Lion)
SOLUTION
9.200
9.285.00
26 Jul 2012
NOTES:
AUTOMATIC REMOVAL INSTRUCTIONS
To automatically remove this malware from your system, use live casino online's special . Download, extract, and run the said fixtool in the same folder where your latest live casino online pattern file is located. For more details, refer to the fixtool's incorporated text file.
MANUAL REMOVAL INSTRUCTIONS
Step 1
Delete files dropped by this malware. To delete the autostart file, open a Terminal window and type the following command:
"rm /Library/LaunchAgents/com.apple.mdworker.plist"
"rm /Users/{user name}/Library/LaunchAgents/com.apple.mdworker.plis"
Step 2
Restart your computer.
Step 3
Deleting the malware folder. To delete the malware folder, navigate to the following folders in Finder:
- /Library/ScriptingAdditions/appleHID
- /Users/{user name}/Library/ScriptingAdditions/appleHID
Drag each folder to the Trash. Empty the Trash.
Step 4
Scan your computer with your live casino online product to delete files detected as OSX_MORCUT.A. If the detected files have already been cleaned, deleted, or quarantined by your live casino online product, no further step is required. You may opt to simply delete the quarantined files. Please check this for more information.