macOS下malware移除之Qsearch變種劫持(Remove hijacking of Qsearch)

前言:
Foreword:

前幾天又收到一個網友求助,說受到了Qsearch的困擾,在要求其說明大概發生現象和時間點後,按照老方法收集信息後開始分析其感染的惡意文件來源。但是按她說的時間點,始終無法找到Qsearch相關的可疑文件,而且她答覆說自己已經按照文章刪除了相關配置,這就比較麻煩了。因爲劫持問題還一直存在,只能擴大檢查範圍,根據存活的進程去分析哪些有可能是惡意軟件開啓的,最後讓其多次發送相關配置進行檢測分析後才確定感染源,其實已經早在2019年就已經有相關配置,但是不知爲何最近他才發現受到Qsearch的困擾。

難道是Qsearch出現新的變異或策略了?

A few days ago, I received another netizen for help, saying that I was troubled by Qsearch. After asking him to explain the approximate phenomenon and the time point, I collected the information according to the old method and began to analyze the source of the infected malicious files. But according to the time point she said, she could not find suspicious files related to Qsearch, and she replied that she had deleted the relevant configuration according to the article, which was more troublesome. Because the problem of hijacking still exists, we can only expand the scope of the inspection. According to the surviving process, we can analyze which may be activated by the malware. Finally, let it send the relevant configuration multiple times for detection and analysis to determine the source of infection. In fact, it has been as early as 2019. There have been relevant configurations for years, but I do not know why he only recently discovered that he is troubled by Qsearch.

Is there a new mutation or strategy in Qsearch?

網友的反饋截圖如下:

Screenshots of feedback from some of these netizens are as follows:

最終,當然是完美解決啦,滿滿的幸福感!

Finally,Of course it is the perfect solution, full of happiness!

聲明:
Declaration:

由於網絡中的病毒virus/malware等存在隨時變異或者對應多種感染方式等情況,本文所針對的處理方法僅針對本次樣本負責,個人如有誤操作,後果自負(一般沒啥問題的,別被嚇着了)。如需幫助,可以關注微信公衆號(我在全球村)給我留言,或加我微信(KingisOK)聯繫我!

Because the virus / malware in the network mutates at any time or corresponds to multiple infection modes, the processing method targeted in this article is only responsible for this sample. If you personally misuse it, you will be at your own risk. Scared). If you need help, you can follow the WeChat public account (MyGlobalVillage) to leave a message for me, or add me on WeChat (KingisOK) !

現象
Phenomenon:

Chrome瀏覽器被惡意軟件劫持了,即Qsearch劫持了他的瀏覽器,修改了其主頁,而且主頁再也不能被還原成默認值,是不可用狀態。他已經看見了我前面的某篇文章,進行了一些基本移除。

 

看到這裏,我首先意識到肯定是Qsearch出現了變種,所以他找不到相應的配置,我發給其腳本運行,讓他把收集到的信息提供給我分析,很快經過仔細篩查後,發現了他是去年感染的相應惡意配置,並提供給其解決方法。終於經過一些指導處理後他成功移除了相應的惡意插件,瀏覽器的主頁也恢復了正常,表示非常感謝。

The Chrome browser was hijacked by malware, that is, Qsearch hijacked his browser, modified its homepage, and the homepage can no longer be restored to the default value, which is unavailable. He has already seen an article in front of me and made some basic removals.

Seeing this, I first realized that there must be a variant of Qsearch, so he could not find the corresponding configuration, I sent it to the script to run, let him provide me with the collected information for analysis, and soon after careful screening , Found that he was the corresponding malicious configuration infected last year, and provided a solution to it. Finally, after some instructions, he successfully removed the corresponding malicious plug-in, and the homepage of the browser returned to normal, thank you very much.

分析
Analysis:

根據用戶反饋提供的信息,收集如下:

Based on the information provided by user feedback, the collection is as follows:

經過對上述文件的分析,初步懷疑跟下述路徑及其關聯的程序有關:

Based on the analysis of the above documents, it is preliminarily suspected that it is related to the following paths and related procedures:

~/Library/LaunchAgents/com.utilityData.plist
~/Library/LaunchAgents/com.UtilityParze.plist
~/Library/LaunchAgents/com.TabHelper.plist
~/Library/UpdatesMac
~/Library/TimeCheck
/Users/kevinstephen/Library/TabHelper/TabHelper.app 
/Library/PrivilegedHelperTools/com.netease.uumac.helper
/Library/PrivilegedHelperTools/com.netease.uumac.helper*


相關插件配置:MyCouponsmart

Related plug-in configuration:  MyCouponsmart

Chrome/Default/Extensions/lfbenaabfliihodeianphjhhhcjgddlh


實際上這個就是用戶問題出現的最終原因,因爲安裝了上述惡意插件,導致系統瀏覽器被人爲修改,這個插件的配置位置很特別,導致用戶無法尋找,甚至有些殺毒軟件都沒有掃描到這個路徑下的文件,恰好惡意插件的配置就安裝在這個位置。

由於用戶自己根據我以前的文章,已經移除了一部分惡意配置,所以上述配置路徑可能並不全面。

In fact, this is the ultimate cause of user problems. Because the above malicious plug-ins are installed, the system browser is artificially modified. The configuration location of this plug-in is very special, which makes it impossible for users to find. Even some anti-virus software does not scan the files in this path, and the configuration of malicious plug-ins is installed in this location.

Since some malicious configurations have been removed by users themselves according to my previous articles, the above configuration paths may not be comprehensive.

如果你有發現近期出現問題前後才生成的上述文件,請將其通過terminal終端運行進行移除。

If you have found the above files that were generated before and after the recent problem, please remove them through the terminal .

處理方法:
Approach:

首先,移除上述截圖中的profiles文件下的所有配置,恢復成空白默認值。

First, remove all the configuration under the profiles file in the screenshot above and restore it to the blank default value.

其次,移除上述路徑下的配置文件(根據自己發現的實際路徑進行引用),如果有。檢查是否還存在相關的其他配置文件,殺掉該進程,再重啓電腦。

Secondly, Remove the configuration file under the above path(reference according to the actual path you find), if any. Check if there are other related configuration files, kill the process, and restart the computer.

但針對本次的樣本,在本地文件夾還可能有其它的一些惡意配置存在,需要一併移除,以免死灰復燃!

But for this sample, there are some other malicious configurations in the local folder, which need to be removed together to avoid resurgence!

~/Library/LaunchAgents/com.utilityData.plist
~/Library/LaunchAgents/com.UtilityParze.plist
~/Library/LaunchAgents/com.TabHelper.plist
~/Library/UpdatesMac
~/Library/TimeCheck
/Users/kevinstephen/Library/TabHelper/TabHelper.app 
/Library/PrivilegedHelperTools/com.netease.uumac.helper
/Library/PrivilegedHelperTools/com.netease.uumac.helper*
Chrome/Default/Extensions/lfbenaabfliihodeianphjhhhcjgddlh



移除上面Chrome所對應的插件,可能會以其他名稱顯示。

Remove the plug-in corresponding to Chrome above, it may be displayed under another name.

實際上,上述文件對當前Mac系統的影響微乎其微,即使有誤刪,後期根據需要可以重新安裝,所以刪除不會影響系統的正常運行。

In fact, the above files have little impact on the current Mac system. Even if it is deleted by mistake, it can be reinstalled as needed later, so the deletion will not affect the normal operation of the system.

可疑文件全部移除完成後,最好重置瀏覽器,或者移除之前保存的狀態數據

After all the suspicious files have been removed, it is best to reset the browser or remove the previously saved state data.

~/Library/Saved\\ Application\\ State/com.apple.Safari.savedState
~/Library/Saved\\ Application\\ State/com.google.Chrome.savedState

 

再啓動查看是否恢復正常。

Restart to see if it returns to normal.

 

忠告:
Advice:
1,蘋果電腦要更新和下載軟件儘量去App Store,其他瀏覽器突然彈出的說電腦有問題或者軟件需要更新,都儘量不要點!!!!

2,電腦設置中安全設置,選項選擇只安裝認證過的軟件!!!

3,要使用破解版軟件,就必須做好被安裝廣告和惡意插件的心理準備!

1, Apple computer to update and download software as far as possible to the App Store, other browsers suddenly pop up saying that the computer has a problem or the software needs to be updated, try not to point! ! ! !

2, the security settings in the computer settings, the option to choose only installed certified software! ! !

3. To use the cracked version of software, you must be mentally prepared to install advertisements and malicious plug-ins!

 

如果覺得本文對你有幫助,那就贊一個或者關注我吧,您的支持是我繼續前進的動力!

If this article is helpful to you, please click like or comment on it. Your support is my motivation to move forward!
 

發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章