Mackeeper activation code generator free Archives
mackeeper activation code generator free Archives
macOS Bundlore: Mac Virus Bypassing macOS Security Features
Download a PDF version
MacKeeper Anti-Malware Lab continually monitors current threats to be sure that our customers are secure. Since 2015, macOS Bundlore has been a noticeable phenomenon in the macOS security landscape. It is known for using different techniques to bypass macOS security measures.
In this article, we provide insights on macOS Bundlore’s main components, the way they work and how Bundlore can be detected and deleted.
What is macOS Bundlore?
Why is macOS Bundlore on the rise in 2019?
How does macOS Bundlore get installed on users’ computers?
macOS Bundlore command-and-control communication
macOS Bundlore privilege escalation, defense evasion, and persistence
macOS Bundlore advertisement delivery
How does macOS Bundlore overcome macOS 10.14 protection mechanisms?
What does the infrastructure look like?
How do you delete macOS Bundlore and its components?
What is macOS Bundlore?
macOS Bundlore (a.k.a. OSX.Bundlore) is a form of adware—a type of malware that displays unwanted advertisements on infected computers and installs software products offered by affiliates. Its specific feature is that adware applications are installed in a “bundle,” in other words, together with the applications that the user initially wanted to install.
macOS Bundlore applications provide intrusive pop-up ads, which may redirect to malicious websites or prompt a user to submit personal information. Such applications may also collect user-system information, such as IP addresses, queries entered into the search engines, URLs visited, pages viewed, passwords, and so on. The adware also reduces browser performance.
The authors of macOS Bundlore try to keep up with Apple’s new security features. For example, on macOS versions prior to 10.13, macOS Bundlore installed a malicious browser extension that hijacked user search. Now, on macOS versions 10.13 and 10.14, custom user profiles are used for this purpose, because the previous approach is now blocked by macOS security features.
Why is macOS Bundlore on the rise in 2019?
Throughout any given year, MacKeeper’s Anti-Malware Lab collects and analyzes malware samples. During the last year, there was an unusually large amount of macOS Bundlore samples compared to other analyzed malware. In fact, macOS Bundlore is among the top 3 malware families detected by MacKeeper on users’ Macs from December 2018 to January 2019.
The reasons for this proliferation include the following:
- macOS Bundlore is spread through digital advertisement, and ad distributors do not check whether the advertised service is malicious
- macOS Bundlore applications are constantly rebranded and updated to overcome macOS security updates, including System Integrity Protection
- The components of these applications are numerous and hard to delete
How does macOS Bundlore get installed on users’ computers?
macOS Bundlore actively uses advertisement of free software or updates to spread. Often, a fake Flash Player update is used. In general, when the software is downloaded from unofficial sources (torrents, pop-up ads, software download websites), the risk of getting malware like macOS Bundlore is high.
Example of a macOS Bundlore dropper download page.
Below is a general outline of how macOS Bundlore’s installer works.
At first, a bash script called Install.sh downloads an archive with an application called mm-install-macOS from a remote server otcct.beforeoctavia.site, then extracts its content to a temporary directory and executes it.
At the next stage, it contacts a command-and-control server service.macinstallerinfo.com to download installation scripts. Additionally, it reports every step of the installation process to another server, events.ponystudent.win.
To be able to interact with the system, macOS Bundlore needs the user’s password, so it spawns a misleading window that pretends to be from macOS and collects the entered password.
To verify if a password is valid, macOS Bundlore uses the following command:
/bin/sh -c echo $’password’ | sudo -S echo __tbt_true 2>&1
From this point, macOS Bundlore is able to perform any actions with pseudo-privileges without an additional permission from the user.
macOS Bundlore downloads multiple scripts from a remote server during installation. One of them is called InstallSoftware and is responsible for installing software offered by affiliates. In this case, it is MediaDownloader. Another one is called InstallOffers. The main purpose of InstallOffers is to install additional components of macOS Bundlore.
Here is a general macOS Bundlore execution flow diagram:
Still, macOS Bundlore has some functional differences on different macOS versions.
macOS Bundlore consists of three main components:
- An updater (MyMacUpdater) is responsible for communicating with the command-and-control server to get the latest version of macOS Bundlore
- WebTools bypasses macOS security measures, changes browser behavior, achieves persistence, and installs an ad delivery component
- An ad delivery application (MyCouponsmart) injects malicious JavaScript code with AppleScript into a browser
Below is a detailed analysis of all macOS Bundlore components and their behavior that we observed on macOS 10.12.
macOS Bundlore command-and-control communication
As we mentioned earlier, macOS Bundlore installs an updater, in our case it was called MyMacUpdater. The main purpose of the updater is to get updates from service.ezsoftwareupdater.com and install them. The updater has its own LaunchAgent, and it checks for updates every 12 hours. Here is updater’s check_update method. If a new version is found, it downloads it and then executes the downloaded file.
macOS Bundlore privilege escalation, defense evasion, and persistence
WebTools, a component of Bundlore, is a Mach-O file that invokes an in-built system function to decrypt the following execution stage and send it as input to /bin/bash for execution.
At the next stage, multiple actions are performed. WebTools checks whether any of its brands are already installed. Brands are different names for the ad delivery component. In fact, all brands are the same binary file.
Then WebTools downloads and installs the ad delivery component—an application that injects malicious JavaScript code with AppleScript into a browser. In our test, it is called MyCouponsmart. WebTools installs it to the Applications folder then achieves persistence with LaunchAgent or LaunchDaemon depending on the permission it has. WebTools makes a backup for the ad delivery component under the user’s Application Support directory with a dot in front of the application name, so it is hidden.
After the installation, WebTools gets information about macOS and Safari versions. If a macOS version is 10.12 or older and a Safari version is 10 or older, it modifies the TCC.db (Accessibility preferences database) to enable AppleScript access to applications like Terminal, Safari or Chrome so that it can interact with them.
To be able to run JavaScript code in Safari, WebTools enables the developer menu and modifies authorizationdb.
If Firefox is installed, WebTools deploys a malicious browser extension.
In the end, WebTools runs a post-installation check to verify that an ad delivery component was installed, persistence was achieved, and it can run JavaScript in Safari and Chrome. Installation progress is reported to a remote server, events.blitzbarbara.win.
macOS Bundlore advertisement delivery
The ad delivery’s main executable is a bash script called stubLaunch, which decodes a Base64-encoded .enc file inside the ad delivery’s folder and runs it. A decoded binary creates a pipe and fork. In the parent process, it decrypts the payload, and writes it to the pipe while the child process reads data from the pipe, then sends it to a newly created Python process.
A Python custom-encrypted code is written to a pipe payload. But it is trivial to decrypt it, because we have a decryption function.
After decrypting, Base64 decoding, and bz2 decompressing, there is another obfuscated Python code including strings encrypted with the above-mentioned algorithm. We decrypted all strings and renamed all classes and functions. The most interesting thing about the final Python code is the following “if” statement.
The “out of browser” key decides how macOS Bundlore will interact with a browser. If it is off, as a default value, it will run Evil_init.run() method. Run method checks if its files were removed and tries to restore them from a backup.
Inject browser method tries to inject malicious JavaScript code into a browser with AppleScript and reports the status to events.mycouponsmartmac.com.
But if the “out of browser” key is set to “on,” it will run Evil2_init.run() method. This run method retrieves RC4-encrypted AppleScript from auctioneer.50million.club and executes it.
Decrypted AppleScript checks for running browsers, gets an offerId from a URL auctioneer.50million.club/server and runs the following code to spawn a new window with an advertisement.
How does macOS Bundlore overcome macOS 10.14 protection mechanisms?
The above-mentioned process was described for macOS version 10.12 and older. Since then, Apple has implemented multiple new security features. Starting from macOS version 10.12.2, they moved TCC.db under System Integrity Protection (SIP), ensuring that even with root access to your system, malware cannot change critical system files and settings. Moreover, in macOS 10.14 Apple included Mail, Messages, Safari, Home, iTunes data files, and Time Machine backup to files protected by SIP. Another new security feature is that Apple removed the possibility of downloading third-party extensions that aren't available in the Safari Extensions Gallery.
Yet, macOS Bundlore has mechanisms to overcome these security mechanisms as well.
In the most recent version, WebTools (a component of macOS Bundlore which bypasses macOS security measures, changes browser behavior, achieves persistence, and installs an ad delivery component) consists of one application instead of multiple binaries and bash scripts. Still, there is a possibility to analyze the latest version of WebTools without diving into assembler code, as in the end it sends clear text logs to a tracking server.
WebTools creates multiple blocking windows, so a user won’t be able to stop the installation process or see what it executes.
In the previous versions, WebTools modified TCC.db to be able to control other applications with AppleScript. But now TCC.db is under SIP, which means the user can’t access it even with administrator permissions until SIP is turned off.
WebTools uses interesting techniques to bypass SIP. First, it creates a pair of keys with the ssh-keygen utility. Then WebTools moves a newly-created key to user’s authorized_keys and enables remote login. This means, WebTools can use these keys to access the machine without a password.
Next, it uses the sftp utility to login to a local ssh service with a newly-created pair of keys. From this point, WebTools can access and modify files protected by SIP.
WebTools uses the same technique to modify com.apple.Safari.Extensions.plist preferences and apply changes using the profiles utility. It uses the same utility to change Chrome behavior.
Another file WebTools modifies is com.apple.Safari.plist, where it changes browser behavior such as home page and new tab opening functionality. It also allows JavaScript execution from AppleScript. Next, WebTools installs an ad delivery component and archives persistence.
What does the infrastructure look like?
It is interesting why domains related to this adware are still active. Usually, domains spreading malware are blocked within a month. Still, the domain service.macinstallerinfo.com has remained active since 2015. From that time until now, it has used Rackspace cloud service located in the US. Of course, the email of the domain registrant is hidden by an anonymization service, domainsbyproxy. A possible reason is that there may not have been any complaints regarding this domain.
Another interesting fact is that all domains related to this adware have subdomain events where all tracking information is sent by adware installers, and all of them point to one IP address, which is also located on the same hosting service. This shows a connection for all components of macOS Bundlore.
How do you delete macOS Bundlore and its components?
To protect yourself, be sure to install the latest macOS updates and download all applications from legitimate sources, such as official vendor websites.
If your system is infected with macOS Bundlore or you suspect it may be, make sure you use a reliable anti-malware solution to scan the system and remove the adware.
At Kromtech, we’ve ensured that MacKeeper removes macOS Bundlore components, excluding any SIP-protected files—due to the nature of such protection. They include Safari’s preferences files, which can be removed manually.
For further research on macOS Bundlore, you can use the following list of Indicators of compromise.
IOC
$HOME/Applications/MyMacUpdater
$HOME/Library/LaunchAgents/com.MyMacUpdater.agent.plist
$HOME/Library/Application Support/.MMUpdater/MMUpdater
/Applications/MyCouponsmart
/$HOME/Library/Application Support/.MyCouponsmart
$HOME/Library/LaunchAgents/com.MyCouponsmart.agent.plist
/Library/LaunchDaemons/com.MyCouponsmart.agent.plist
/Applications/MyShopcoupon
$HOME/Library/Application Support/.MyShopcoupon/MyShopcoupon
$HOME/Library/LaunchAgents/com.MyShopcoupon.agent.plist
Firefox addon path:
~/Library/Application Support/Firefox/Profiles/[profile name]/extensions/.*@MyCouponize.com.xpi
List of all connected brands:
flashmall webshoppers webshoppy smartshoppy shoptool shoppytool coolshopper easyshopper liveshoppers smart-shoppy easy-shopper bestwebshoppers hotshoppy bestsmartshoppers myshopmate myshopbot surfmate surfbuyer couponizer shoppinizer shopperify mycouponize myshopcoupon
You’ll need to check Applications, Application Support, and LaunchAgents folders against these brands as well as currently running processes.
Modified plists:
~/Library/Containers/com.apple.Safari/Data/Library/Preferences/com.apple.Safari.Extensions.plist
~/Library/Containers/com.apple.Safari/Data/Library/Preferences/com.apple.Safari.plist
~/Library/Preferences/com.apple.Safari.SandboxBroker.plist
~/Library/Safari/Bookmarks.plist
~/Library/Safari/Extensions/Extensions.plist
~/Library/Preferences/com.google.Chrome.plist
IPs:
161.47.20.33
Domains:
auctioneer.50million.club
cdn.macmymacupdater.com
cdn.mycouponsmartmac.com
cdn.myshopcouponmac.com
events.blitzbarbara.win
events.macinstallerinfo.com
events.mycouponsmartmac.com
events.ponystudent.com"
otcct.beforeoctavia.site
secure.mycouponsmartmac.com
service.ezsoftwareupdater.com
service.macinstallerinfo.com
software.macsoftwareserver05.com
If you’ve detected some suspicious activity on your computer, you can really help us with further research by sending us malware samples and other relevant information. Learn more.
Written By
Olga Sushko
Olga is a privacy advocate and cybersecurity enthusiast.
Top Antivirus Software for PC, Mac & Android | Call @ 1-800-359-4380 Toll Free
MacKeeper Antivirus Activation Key
Antivirus is used for protecting the system from the harmful threats and to remove the junk files. Mackeeper is very popular and is the first choice among the user. It is easy to manage all the routine task and utilize the various task for the numerous apps.
Features of MacKeeper Antivirus Product Key
- Provide the real-time security and block all kinds of virus, rogues, trans, adware, spyware, hack tool, harmful tools and apps, rootkits and lot of other infected files.
- Safeguard for internet protection tools
- High-performance scan engine
- Secure and safe for each and every search result
- Best and safest by scanning outdated programs and missing updates
- The most important feature is camera protection
- Disk clean up and apple certified support
- The superior feature is data control
- Easy to use, install and accuracy with parental control
- Protection for online accounts and keeps the software updated
Your system requires
- 1 GB RAM
- 1 GHz intel processor
- 60 MB HDD space
- Mac 10.6 os x or high 64- bit
How to crack
- Go to mackeeper app
- Now install little snitch 3.3.4 and restart
- Then enter a serial number to activate
- Click on the little snitch
- Select on the rule
- Click on the new to create new rule
- Click the down arrow to select the program
- Now select the server hostname and input
- Select deny
- Select the IP address then enter 15.138.185
- Now Run the program and finally, you are done
MacKeeper Antivirus Customer Support
Mackeeper offers a tool to secure your ID and password. The supporters are available 24*7 hours for the solution of al the error you face in your laptop, system, via phone, emails.
Category Archives: Mac
iExplorer 4.2.10 Crack
iExplorer 4.2.10 Crack with Registration Code Download Torrent Here!! iExplorer Crack is the software that you can use to manage your iOS devices. So you can use your iOS devices as flash drives. Since you can use your iOS devices as flash drives. So, you can transfer data in them. Also, you can back-up iOS data… Read More »
iPhone Backup Extractor 7.6.13 Build 1841 Crack
iPhone Backup Extractor 7.6.13 Crack Keygen Download! iPhone Backup Extractor Crack is the software that can extract data from iOS backup. It is able to extract data from the backup from iPhone, iPad or iPod. Since you can make iTunes and iCloud backup. So, you use the software to get data out of these backups.… Read More »
Avira Antivirus Pro Crack v15.0.44.143 2019 Premium
Avira Antivirus 15.0.44.143 Crack with Keygen & License Key Download! Avira Antivirus Pro Crack is the best antivirus software that you can have to fight against viruses and it is capable of protecting you from all kinds of threats, therefore, it will keep your computers free of viruses and malware. It can easily detect all… Read More »
TransMac Crack v12.3 Free Download
TransMac 12.3 Crack with Keygen Full Free Download TransMac Crack is the application to run Mac OS programs in Microsoft Windows, it is also capable of opening Mac OS files system disks in Windows as well. It is a very powerful application, still, it is very easy to use, since Mac OS is a great… Read More »
iMazing 2.9.5 Crack
iMazing 2.9.5 Crack With Keygen for Mac & Windows Full Torrent Free Download Here! iMazing Crack is the software to manage iOS devices. It the one of the best software for this task. It can support all iOS devices. And you can use this software for all tasks of iOS devices. iOS devices are iPod,… Read More »
Final Cut Pro X Crack 10.4.6 Free Download
Final Cut Pro X 10.4.6 Crack Keygen Download!! Final Cut Pro X Crack is the application that you can use for video editing, it is a Professional-Level application. And it is also a non-linear application. It is from Apple Inc. and it is also a very powerful application and it has all the tools you… Read More »
Logic Pro X 10.4.4 Crack
Logic Pro X 10.4.4 Crack with Keygen Torrent Download Logic Pro Crack is the software that you can use to record music. It is also able to edit the music. As well as mix the music. This software has a lot of power in it. Which makes it a robust software. You can only use… Read More »
Paragon NTFS 15.4.59 Crack
Paragon NTFS 15.4.59 Crack for Mac Torrent Download Here!! Paragon NTFS Crack is the software that you can use to use the NTFS file system in Mac OS. In MS Windows NTFS is the file system. But Mac OS cannot use the drive that uses NTFS. Even though Mac OS is very robust software. And… Read More »
ESET Cyber Security 6.7.555.0 Crack
ESET Cyber Security 6.7.555.0 Crack Pro Download Here! ESET Cyber Security Crack is the software which keeps you secure from online threats. It is able to detect all sort of threats at a fast speed. So, you can browse the web without worrying about threats. There is a lot of software of this kind. But… Read More »
MacKeeper 3.23 Crack
MacKeeper 3.23 Crack Apple Full Free Torrent Download Here! MacKeeper Crack is the software that can make it easy to manage the Mac. It can also keep your Mac secure. It has a lot of features. So, you can also call it a one-stop shop. Because it can keep you secure in a lot of… Read More »
What’s New in the mackeeper activation code generator free Archives?
Screen Shot
System Requirements for Mackeeper activation code generator free Archives
- First, download the Mackeeper activation code generator free Archives
-
You can download its setup from given links: