

Since we're playing along, we click 'Next' to install it all! Once the outgoing connection is allowed, the Installer application kindly asks the user to install some 'adware' and potentially unwanted programs: To change the VM's mac address, shut it down, then change it via the VM's Network Adapter's settings (click 'Advanced Options' to modify the MAC address).Īlright, let's run the damn Installer.app already!įirst thing, LuLu (my soon-to-be-released macOS firewall!) detects an outgoing network connection: Apparently this is common trick used in macOS adware! Thomas Reed ( correctly guessed that this 'VM detection' is done by examining the MAC address (VMWare VMs have 'recognizable' MAC address). This is required step, because it turns out that the installer actually doesn't do anything malicious, (besides actually installing a legit copy of Flash), if it detects it running in VM. Now, before we run this in a VM - let's change the MAC address of the virtual machine. $ strings -a ~/Downloads/Mughthesec/Installer.app/Contents/MacOS/mac | grep http Using spctl, we can confirm the disk image's certificate is still valid (i.e. Using WhatsYourSign, we can examine the signing info: Uploaded to VirusTotal on August 4th as Player.dmg, it currently remains undetected: Let's start with the installer disk image.

Gavriel was kind enough to share a sample ( 'Mughthesec') with me, and that, coupled with the assistance from another security researcher, led to recovery of what appeared to be the original installer (sha256: f5d76324cb8fcae7f00b6825e4c110ddfd6b32db452f1eca0f4cff958316869c)Īs neither the sample, Mughthesec, nor the (signed!) installer were detected by any AV engines on Virus Total I decided to take a closer look.

Interestingly, googling " Mughthesec" only returned one relevant hit a post on Apple's online's forums tilted "Safari does not render Gmail correctly". Yesterday Gavriel State ( posted an interesting tweet: Want to play along? I've shared the adware, which can be downloaded here (password: infect3d).
