"All three files for the three different platforms behave the same way. They all connect to 220.127.116.11 to get additional code to execute. The ports are 8080, 8081, and 8082 for OSX, Linux, and Windows respectively," points out F-Secure.
Windows and Mac users are asked to trust and run the served malware, but if the latter run OS X on an Intel processor, they will also be asked to install Rosetta - a piece of software needed to allow
applications written for Macs with PowerPC processors to run on an Intel one:
This additional step should have hopefully made them think twice about installing the offered application.
All of the served Trojans are backdoors, and according to the researchers, the Java applet that initializes the attack seems to have been created with the Social-Engineer Toolkit, a penetration testing tool.