Backdoor:​OSX/Olyx.C

Threat description

Details

CATEGORYMalware
TYPEBackdoor

Summary

Backdoor:OSX/Olyx.C connects to a remote server to receive further instructions, without the knowledge or permission from the user.



Removal

Manual Removal Instructions
  • 1. Open Activity Monitor, select DockLight, and click Quit Process.
  • 2. Open Terminal, then execute the following:
    • sudo rm /Applications/Automator.app/Contents/MacOS/DockLight
    • rm ~/Library/LaunchAgents/com.apple.DockActions.plist

Technical Details

Arrival

Olyx.C is dropped into the system by malicious Word documents that exploit the vulnerability identified by CVE-2009-0563.

Installation

The malware drops the following copy of itself:

  • /Applications/Automator.app/Contents/MacOS/DockLight

It creates the following launchpoint for the file above:

  • ~/Library/LaunchAgents/com.apple.DockActions.plist
Payload

The malware connects to a2012[...].slyip.net[...] to obtain additional commands.

The backdoor is capable of performing the following actions:

  • Downloading and uploading files
  • Executing shell commands
Other variants

Submit a Sample

Suspect a file or URL was wrongly detected? Send it to our Labs for further analysis

Submit a Sample

Disinfect your Mac

F-Secure Anti-Virus for Mac will disinfect your Mac and remove all harmful files

More Info