OSX/Eleanor [Threat Name] go to Threat

OSX/Eleanor.A [Threat Variant Name]

Category trojan
Size 2879312 B
Detection created Jul 05, 2016
Detection database version 13758
Aliases Mac.BackDoor.Eleanor.1 (Dr.Web)
  OSX/Eleanor-A (Sophos)
  Backdoor.MAC.Eleanor.A (BitDefender)
Short description

The trojan serves as a backdoor. It can be controlled remotely. The trojan can be used to gain full access to the compromised computer.

Installation

When executed, the trojan creates the following folders:

  • /Users/%username%/Library/.dropbox/sync
  • /Users/%username%/Library/.dropbox/.rero
  • /Users/%username%/Library/.dropbox/utilities

The following files are dropped:

  • /Users/%username%/Library/.dropbox/ego.php
  • /Users/%username%/Library/.dropbox/rules
  • /Users/%username%/Library/.dropbox/deamon.php
  • /Users/%username%/Library/.dropbox/config
  • /Users/%username%/Library/.dropbox/check_hostname
  • /Users/%username%/Library/.dropbox/public.key
  • /Users/%username%/Library/.dropbox/dbd

The trojan disguises itself as the EasyDoc Converter application.

In order to be executed on every system start, the trojan creates the following file:

  • /Users/%username%/Library/LaunchAgents/com.getdropbox.dropbox.usercontent.plist
  • /Users/%username%/Library/LaunchAgents/com.getdropbox.dropbox.integritycheck.plist
  • /Users/%username%/Library/LaunchAgents/com.getdropbox.dropbox.timegrabber.plist

The trojan quits immediately if any of the following applications is detected:

  • Little Snitch
Information stealing

OSX/Eleanor.A is a trojan that steals sensitive information.


The trojan collects the following information:

  • webcam video/voice
  • list of running processes
  • list of files/folders on a specific drive

The trojan attempts to send gathered information to a remote machine.


The trojan opens some HTTP, SSH ports:

  • 9991
  • 9992

The TOR protocol is used in the communication.

Other information

The trojan acquires data and commands from a remote computer or the Internet.


It can execute the following operations:

  • capture webcam video/voice
  • execute shell commands
  • various filesystem operations
  • send files to a remote computer

Please enable Javascript to ensure correct displaying of this content and refresh this page.