OSX/Sednit [Threat Name] go to Threat

OSX/Sednit.B [Threat Variant Name]

Category trojan
Size 78960 B
Aliases OSX.Dropper (Symantec)
  MacOS:Ldipadoor-A.[Trj] (Avast)
  Mac.BackDoor.Komplex.7 (Dr.Web)
Short description

The trojan serves as a backdoor. It can be controlled remotely.


The trojan generally spreads through links in spam emails which point to websites containing malware.

OSX/Sednit.B usually redirects the browser to a malicious URL or implements a specific exploit.

To gain root access it uses one of these exploits:

* MacKeeper URL Handler Remote Code Execution

The trojan creates the following files:

  • /Users/Shared/dufh

In order to be executed on every system start, the trojan creates the following file:

  • /Library/LaunchAgents/com.apple.updater.plist
Information stealing

OSX/Sednit.B is a trojan that steals sensitive information.

The trojan collects the following information:

  • user name
  • operating system version
  • list of running processes

The trojan attempts to send gathered information to a remote machine.

Other information

The trojan acquires data and commands from a remote computer or the Internet.

The trojan contains a list of (1) IP addresses. The HTTP protocol is used in the communication.

It can execute the following operations:

  • download files from a remote computer and/or the Internet
  • run executable files
  • execute shell commands
  • set file attributes
  • send files to a remote computer
  • send gathered information

The trojan quits immediately if it is run within a debugger.

It contains the following strings:

  • AmIBeingDebugged

The trojan can be used to gain full access to the compromised computer.

Please enable Javascript to ensure correct displaying of this content and refresh this page.