{"id":3783,"date":"2012-03-15T12:40:01","date_gmt":"2012-03-15T19:40:01","guid":{"rendered":"http:\/\/blog.intego.com\/?p=3783"},"modified":"2016-02-12T10:14:07","modified_gmt":"2016-02-12T18:14:07","slug":"new-version-of-imuler-trojan-horse-masquerades-as-image-files","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/","title":{"rendered":"New Version of Imuler Trojan Horse Masquerades as Image Files"},"content":{"rendered":"<p>Intego has discovered a new version of the Imuler Trojan horse, which the company <a href=\"https:\/\/www.intego.com\/mac-security-blog\/mac-pdf-trojan-horse-surfaces-threat-is-low\/\">first discovered in September, 2011<\/a>. At the time, the sample discovered masqueraded as a PDF file containing Chinese text. This was not found in the wild, and the risk was considered to be low.<\/p>\n<p><!--more--><\/p>\n<p>The latest version, Imuler.C, has been found to be disguised as image files. Intego found two samples of this malware on the <a href=\"https:\/\/www.virustotal.com\/\">VirusTotal website<\/a>, a site used by security companies to share malware samples. Two samples were found, both in zip archives: \u201cPictures and the Ariticle of Renzin Dorjee.zip\u201d and \u201cFHM Feb Cover Girl Irina Shayk H-Res Pics.zip.\u201d In both cases, an application was included among the various files, with an icon making it look like an image:<\/p>\n<p><center><br \/>\n<img loading=\"lazy\" title=\"imuler-c1\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/03\/imuler-c1.png\" alt=\"\" width=\"528\" height=\"252\" \/><\/center><img loading=\"lazy\" title=\"imuler-c2\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/03\/imuler-c2.png\" alt=\"\" width=\"519\" height=\"118\" \/><\/p>\n<p>This technique is not new, and takes advantage of a default setting in the Mac OS X Finder, whereby file extensions are not displayed. Users double-clicking on the application launch the malware, which quickly deletes itself, replacing the original application with a real JPEG image corresponding to the one that was an application, and displays this image in the user&#8217;s default image viewer. There is no visible trace of the application after this point.<\/p>\n<p>The malware installs a backdoor at \/tmp\/.mdworker, along with other files in this directory. A process called .mdworker then launches; the mdworker process (not the absence of the . before the name) is a processed used by Spotlight to index files.<\/p>\n<p>A launchagent file is also installed at ~\/library\/LaunchAgents\/checkvir.plist, along with an executable in the same folder, ensuring that the malware launches when the user logs into his or her Mac, or starts it up. After a restart, the .mdworker process is deleted, and the checkvir executable launches.<\/p>\n<p>This malware searches for user data, and attempts to upload it to a server. It also takes screenshots and sends them to the server. It creates a unique identifier for the specific Mac to be able to link the Mac and the data it collects. We have seen that this malware is active, as it connects to a remote server and downloads new executables.<\/p>\n<p>For now, Intego has not found this malware in the wild, and considers the risk to be low for now. However, we recommend that Mac users display file extensions in the Finder&#8217;s Advanced preferences:<\/p>\n<p><center><br \/>\n<img loading=\"lazy\" title=\"imuler-c3\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/03\/imuler-c3.png\" alt=\"\" width=\"542\" height=\"170\" \/><\/center>It&#8217;s worth noting that Finder windows offer view options (View &gt; Show View Options), which include a setting to Show Icon Preview. If this is unchecked, the application will still display the photo icon, as opposed to a generic application icon:<\/p>\n<p><center><br \/>\n<img loading=\"lazy\" title=\"finder-prefs-show-extensions\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/03\/finder-prefs-show-extensions.png\" alt=\"\" width=\"435\" height=\"347\" \/><\/center>No matter what, if you come across an application that has an icon of a photo, you should not open it.<\/p>\n<p>Intego VirusBarrier X6 with malware definitions dated March 15, 2012, or later protect against the Imuler.C malware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Intego has discovered a new version of the Imuler Trojan horse, which the company first discovered in September, 2011. At the time, the sample discovered masqueraded as a PDF file containing Chinese text. This was not found in the wild, and the risk was considered to be low.<\/p>\n","protected":false},"author":3,"featured_media":3673,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[693,86,132],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Intego has discovered a new version of the Imuler Trojan horse, which the company first discovered in September, 2011. At the time, the sample discovered\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New Version of Imuler Trojan Horse Masquerades as Image Files - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Intego has discovered a new version of the Imuler Trojan horse, which the company first discovered in September, 2011. At the time, the sample discovered\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-03-15T19:40:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-12T18:14:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"128\" \/>\n\t<meta property=\"og:image:height\" content=\"128\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Peter James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png\",\"width\":\"128\",\"height\":\"128\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/\",\"name\":\"New Version of Imuler Trojan Horse Masquerades as Image Files - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#primaryimage\"},\"datePublished\":\"2012-03-15T19:40:01+00:00\",\"dateModified\":\"2016-02-12T18:14:07+00:00\",\"description\":\"Intego has discovered a new version of the Imuler Trojan horse, which the company first discovered in September, 2011. At the time, the sample discovered\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New Version of Imuler Trojan Horse Masquerades as Image Files\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\"},\"headline\":\"New Version of Imuler Trojan Horse Masquerades as Image Files\",\"datePublished\":\"2012-03-15T19:40:01+00:00\",\"dateModified\":\"2016-02-12T18:14:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#webpage\"},\"wordCount\":479,\"commentCount\":4,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png\",\"keywords\":[\"Imuler\",\"Malware\",\"Trojan Horse\"],\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116\",\"name\":\"Peter James\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g\",\"caption\":\"Peter James\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Intego has discovered a new version of the Imuler Trojan horse, which the company first discovered in September, 2011. At the time, the sample discovered","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/","og_locale":"en_US","og_type":"article","og_title":"New Version of Imuler Trojan Horse Masquerades as Image Files - The Mac Security Blog","og_description":"Intego has discovered a new version of the Imuler Trojan horse, which the company first discovered in September, 2011. At the time, the sample discovered","og_url":"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/","og_site_name":"The Mac Security Blog","article_published_time":"2012-03-15T19:40:01+00:00","article_modified_time":"2016-02-12T18:14:07+00:00","og_image":[{"width":"128","height":"128","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Peter James","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png","width":"128","height":"128"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/","name":"New Version of Imuler Trojan Horse Masquerades as Image Files - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#primaryimage"},"datePublished":"2012-03-15T19:40:01+00:00","dateModified":"2016-02-12T18:14:07+00:00","description":"Intego has discovered a new version of the Imuler Trojan horse, which the company first discovered in September, 2011. At the time, the sample discovered","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"New Version of Imuler Trojan Horse Masquerades as Image Files"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116"},"headline":"New Version of Imuler Trojan Horse Masquerades as Image Files","datePublished":"2012-03-15T19:40:01+00:00","dateModified":"2016-02-12T18:14:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#webpage"},"wordCount":479,"commentCount":4,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png","keywords":["Imuler","Malware","Trojan Horse"],"articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/new-version-of-imuler-trojan-horse-masquerades-as-image-files\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d0c16bd0a4dd8f82d91204f400c8d116","name":"Peter James","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0626bfb4ada576ba5aa775322329ad47?s=96&d=mm&r=g","caption":"Peter James"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/peter\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/02\/Malware.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-Z1","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3783"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=3783"}],"version-history":[{"count":4,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3783\/revisions"}],"predecessor-version":[{"id":50197,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/3783\/revisions\/50197"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/3673"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=3783"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=3783"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=3783"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}