# Group Photos.zip OSX/Revir | OSX/iMuler samples March 2012-November 2012 **[contagiodump.blogspot.com/2012/11/group-photoszip-osxrevir-osximuler.html](http://contagiodump.blogspot.com/2012/11/group-photoszip-osxrevir-osximuler.html)** Sophos posted information about a variant of iMuler OSX trojan targeting Tibet activists (New variant of Mac Trojan discovered, targeting Tibet ) and posted the MD5 2d84bfbae1f1b7ab0fc1ca9dd372d35e (FileAgent 37.3 KB) of the trojan . This post is for the actual dropper, which is a full 1.9 MB package (Group photo.zip MD5: 9e34256ded3a2ead43f7a51b9f197937) I don't have a Mac OS VM handy tonight to provide more details about the traffic or behavior so I will just describe the package and post the previous version of the same trojan that was targeting fans of Russian topless models. **Download** **[Download files listed below (email me if you need the password)](http://contagio.deependresearch.org/files/OSX/OSX-imuler.zip)** ----- October 2012 File: Group photo.zip Size: 1976395 MD5: 9E34256DED3A2EAD43F7A51B9F197937 OSX/iMuler 2012-03 img. by ESET March 2012 [Read: ESET OSX/Imuler updated: still a threat on Mac OS X](http://www.blogger.com/OSX/Imuler%20updated:%20still%20a%20threat%20on%20Mac%20OS%20X) 1. 7dba3a178662e7ff904d12f260f0fff3 (Installer) 2. 9d2462920fdaed5e360875fb0cf8274f (malicious payload)) 3. D029E0D44F07F9F4566B0FCE93D8A17E (payload variant) 4. e00a280ad29440dcaab42ad093bcaafd (uploader module) **File Information** Just like [the previous version of iMuler, this trojan hides inside a zip package with application](http://blog.eset.com/2012/03/16/osximuler-updated-still-a-threat-on-mac-os-x) bundle files .app disguised as photos. Default installation of Mac OS will show those app files like any images files - see above. Clicking on them to expand would install the trojan. The screenshot made from Windows and list of files shows clearly that these are not just images. ├───DSC08381.app │ └───Contents │ │ Info.plist │ │ PkgInfo ----- │ │ │ ├───MacOS │ │ .cnf │ │ .confr <<<< Image file │ │ .conft │ │ FileAgent <<<< MD5: [2D84BFBAE1F1B7AB0FC1CA9DD372D35E (Virustotal 6/44)](https://www.virustotal.com/file/574bf26b5da7b8c400d85e48fad3c9ab3ff6fa432f80b46d3bd509940b04f373/analysis/) │ │ │ └───Resources │ │ co.icns │ │ │ └───English.lproj │ InfoPlist.strings │ MainMenu.nib │ ├───DSC08387.app │ └───Contents │ │ Info.plist │ │ PkgInfo │ │ │ ├───MacOS │ │ .cnf │ │ .confr <<<< Image file │ │ .conft │ │ FileAgent <<<< MD5: 2D84BFBAE1F1B7AB0FC1CA9DD372D35E (Virustotal 6/44) │ │ │ └───Resources │ │ co.icns │ │ │ └───English.lproj ----- │ InfoPlist.strings │ MainMenu.nib │ └───DSC08511.app └───Contents │ Info.plist │ PkgInfo │ ├───MacOS │ .cnf │ .confr <<<< Image file │ .conft │ FileAgent <<<< MD5: 2D84BFBAE1F1B7AB0FC1CA9DD372D35E (Virustotal 6/44) │ └───Resources │ co.icns │ └───English.lproj InfoPlist.strings MainMenu.nib File: FileAgent MD5: 2d84bfbae1f1b7ab0fc1ca9dd372d35e Size: 38212 Ascii Strings: --------------------------------------------------------------------------__PAGEZERO __TEXT __text __TEXT __cstring ----- __TEXT __DATA __data __DATA __dyld __DATA __OBJC __image_info __OBJC __IMPORT __jump_table __IMPORT __LINKEDIT /usr/lib/dyld /System/Library/Frameworks/Cocoa.framework/Versions/A/Cocoa /usr/lib/libcrypto.0.9.7.dylib /usr/lib/libgcc_s.1.dylib /usr/lib/libSystem.B.dylib FILE AGEN TVer .conf .conf .cnf TMPA AABBf /tmp /Spo tligf /tmpf TMPA AABBf rm rf " /tmp /tmp/Spotlight /tmp/Spotlight& /tmp/launch-ICS000 #!/bin/sh open " dyld_stub_binding_helper __dyld_func_lookup ----- _init_daemon _encryptFile _copyfile _main _NXArgc _NXArgv ___progname __mh_execute_header _environ start _RC4 _RC4_set_key _access _chdir _chmod$UNIX2003 _close$UNIX2003 _exit _fclose _fopen _fork _fread _free _fwrite$UNIX2003 _malloc _memset _setsid _strcat _strcpy _strlen _system$UNIX2003 _umask /Users/imac/Desktop/macback/FileAgent/main.m /Users/imac/Desktop/macback/FileAgent/build/FileAgent.build/Release/FileAgent.build/Objectsnormal/i386/main.o _init_daemon _encryptFile _copyfile _main 8__PAGEZERO __TEXT __text __TEXT ----- __symbol_stub1 __TEXT __cstring __TEXT __DATA __data __DATA __dyld __DATA __la_symbol_ptr __DATA |__OBJC __image_info __OBJC 8__LINKEDIT /usr/lib/dyld /System/Library/Frameworks/Cocoa.framework/Versions/A/Cocoa /usr/lib/libcrypto.0.9.7.dylib /usr/lib/libgcc_s.1.dylib /usr/lib/libSystem.B.dylib +x8B P8`( x8`( #x|~ /tmp FILEAGENTVer1.0 .confr .conft .cnf TMPAAABBB /tmp/Spotlight /tmp/Spotlight& /tmp/ /tmp/launch-ICS000 #!/bin/sh open " rm -rf " dyld_stub_binding_helper __dyld_func_lookup _init_daemon _encryptFile _copyfile ----- _main _NXArgc _NXArgv ___progname __mh_execute_header _environ start _RC4 _RC4_set_key _access _chdir _chmod$UNIX2003 _close$UNIX2003 _exit _fclose _fopen _fork _fread _free _fwrite$UNIX2003 _malloc _memset _setsid _strcat _strcpy _strlen _system$UNIX2003 _umask /Users/imac/Desktop/macback/FileAgent/main.m /Users/imac/Desktop/macback/FileAgent/build/FileAgent.build/Release/FileAgent.build/Objectsnormal/ppc/main.o _init_daemon _encryptFile _copyfile _main Unicode Strings: --------------------------------------------------------------------------**Automatic scans** ----- Dropper https://www.virustotal.com/file/da7a5e69f1d5e4f77321b90b6153b84daed74d784e5ce016053 fec7fcf5aea0a/analysis/1352874459/ SHA256: da7a5e69f1d5e4f77321b90b6153b84daed74d784e5ce016053fec7fcf5aea0a SHA1: b70505e0e8607b94f1f8437f8298d907168d37d5 MD5: 9e34256ded3a2ead43f7a51b9f197937 File size: 1.9 MB ( 1976395 bytes ) File name: vti-rescan File type: ZIP Detection ratio: 6 / 44 Analysis date: 2012-11-14 06:27:39 UTC ( 0 minutes ago ) DrWeb Trojan.Muxler.7 20121114 ESET-NOD32 OSX/Imuler.E 20121113 F-Secure Trojan-Dropper:OSX/Revir.D 20121114 Sophos OSX/Imuler-B 20121114 TrendMicro OSX_IMULER.D 20121114 TrendMicro-HouseCall OSX_IMULER.D 20121114 https://www.virustotal.com/file/574bf26b5da7b8c400d85e48fad3c9ab3ff6fa432f80b46d3bd50 9940b04f373/analysis/ SHA256: 574bf26b5da7b8c400d85e48fad3c9ab3ff6fa432f80b46d3bd509940b04f373 SHA1: 782312db766a42337af30093a2fd358eeed97f53 MD5: 2d84bfbae1f1b7ab0fc1ca9dd372d35e File size: 37.3 KB ( 38212 bytes ) File name: vti-rescan File type: unknown Detection ratio: 6 / 44 Analysis date: 2012-11-13 20:41:37 UTC ( 9 hours, 8 minutes ago ) DrWeb Trojan.Muxler.7 20121113 ESET-NOD32 OSX/Imuler.E 20121113 F-Secure Trojan-Dropper:OSX/Revir.D 20121113 Sophos OSX/Imuler-B 20121113 TrendMicro OSX_IMULER.D 20121113 TrendMicro-HouseCall OSX_IMULER.D 20121113 -----