前言:
Foreword:

前几天又收到一个网友求助,说受到了Qsearch的困扰,在要求其说明大概发生现象和时间点后,按照老方法收集信息后开始分析其感染的恶意文件来源。但是按她说的时间点,始终无法找到Qsearch相关的可疑文件,而且她答复说自己已经按照文章删除了相关配置,这就比较麻烦了。因为劫持问题还一直存在,只能扩大检查范围,根据存活的进程去分析哪些有可能是恶意软件开启的,最后让其多次发送相关配置进行检测分析后才确定感染源,其实已经早在2019年就已经有相关配置,但是不知为何最近他才发现受到Qsearch的困扰。

难道是Qsearch出现新的变异或策略了?

A few days ago, I received another netizen for help, saying that I was troubled by Qsearch. After asking him to explain the approximate phenomenon and the time point, I collected the information according to the old method and began to analyze the source of the infected malicious files. But according to the time point she said, she could not find suspicious files related to Qsearch, and she replied that she had deleted the relevant configuration according to the article, which was more troublesome. Because the problem of hijacking still exists, we can only expand the scope of the inspection. According to the surviving process, we can analyze which may be activated by the malware. Finally, let it send the relevant configuration multiple times for detection and analysis to determine the source of infection. In fact, it has been as early as 2019. There have been relevant configurations for years, but I do not know why he only recently discovered that he is troubled by Qsearch.

Is there a new mutation or strategy in Qsearch?

网友的反馈截图如下:

Screenshots of feedback from some of these netizens are as follows:

macOS下malware移除之Qsearch变种劫持(Remove hijacking of Qsearch)_chrome

最终,当然是完美解决啦,满满的幸福感!

Finally,Of course it is the perfect solution, full of happiness!

macOS下malware移除之Qsearch变种劫持(Remove hijacking of Qsearch)_.net_02

声明:
Declaration:

由于网络中的病毒virus/malware等存在随时变异或者对应多种感染方式等情况,本文所针对的处理方法仅针对本次样本负责,个人如有误操作,后果自负(一般没啥问题的,别被吓着了)。如需帮助,可以关注微信公众号(我在全球村)给我留言,或加我微信(KingisOK)联系我!

Because the virus / malware in the network mutates at any time or corresponds to multiple infection modes, the processing method targeted in this article is only responsible for this sample. If you personally misuse it, you will be at your own risk. Scared). If you need help, you can follow the WeChat public account (MyGlobalVillage) to leave a message for me, or add me on WeChat (KingisOK) !

现象
Phenomenon:

Chrome浏览器被恶意软件劫持了,即Qsearch劫持了他的浏览器,修改了其主页,而且主页再也不能被还原成默认值,是不可用状态。他已经看见了我前面的某篇文章,进行了一些基本移除。

 

看到这里,我首先意识到肯定是Qsearch出现了变种,所以他找不到相应的配置,我发给其脚本运行,让他把收集到的信息提供给我分析,很快经过仔细筛查后,发现了他是去年感染的相应恶意配置,并提供给其解决方法。终于经过一些指导处理后他成功移除了相应的恶意插件,浏览器的主页也恢复了正常,表示非常感谢。

The Chrome browser was hijacked by malware, that is, Qsearch hijacked his browser, modified its homepage, and the homepage can no longer be restored to the default value, which is unavailable. He has already seen an article in front of me and made some basic removals.

Seeing this, I first realized that there must be a variant of Qsearch, so he could not find the corresponding configuration, I sent it to the script to run, let him provide me with the collected information for analysis, and soon after careful screening , Found that he was the corresponding malicious configuration infected last year, and provided a solution to it. Finally, after some instructions, he successfully removed the corresponding malicious plug-in, and the homepage of the browser returned to normal, thank you very much.

分析
Analysis:

根据用户反馈提供的信息,收集如下:

Based on the information provided by user feedback, the collection is as follows:

经过对上述文件的分析,初步怀疑跟下述路径及其关联的程序有关:

Based on the analysis of the above documents, it is preliminarily suspected that it is related to the following paths and related procedures:

~/Library/LaunchAgents/com.utilityData.plist
~/Library/LaunchAgents/com.UtilityParze.plist
~/Library/LaunchAgents/com.TabHelper.plist
~/Library/UpdatesMac
~/Library/TimeCheck
/Users/kevinstephen/Library/TabHelper/TabHelper.app
/Library/PrivilegedHelperTools/com.netease.uumac.helper
/Library/PrivilegedHelperTools/com.netease.uumac.helper*

相关插件配置:MyCouponsmart

Related plug-in configuration:  MyCouponsmart

Chrome/Default/Extensions/lfbenaabfliihodeianphjhhhcjgddlh

macOS下malware移除之Qsearch变种劫持(Remove hijacking of Qsearch)_chrome_03

实际上这个就是用户问题出现的最终原因,因为安装了上述恶意插件,导致系统浏览器被人为修改,这个插件的配置位置很特别,导致用户无法寻找,甚至有些杀毒软件都没有扫描到这个路径下的文件,恰好恶意插件的配置就安装在这个位置。

由于用户自己根据我以前的文章,已经移除了一部分恶意配置,所以上述配置路径可能并不全面。

In fact, this is the ultimate cause of user problems. Because the above malicious plug-ins are installed, the system browser is artificially modified. The configuration location of this plug-in is very special, which makes it impossible for users to find. Even some anti-virus software does not scan the files in this path, and the configuration of malicious plug-ins is installed in this location.

Since some malicious configurations have been removed by users themselves according to my previous articles, the above configuration paths may not be comprehensive.

如果你有发现近期出现问题前后才生成的上述文件,请将其通过terminal终端运行进行移除。

If you have found the above files that were generated before and after the recent problem, please remove them through the terminal .

处理方法:
Approach:

macOS下malware移除之Qsearch变种劫持(Remove hijacking of Qsearch)_.net_04

首先,移除上述截图中的profiles文件下的所有配置,恢复成空白默认值。

First, remove all the configuration under the profiles file in the screenshot above and restore it to the blank default value.

其次,移除上述路径下的配置文件(根据自己发现的实际路径进行引用),如果有。检查是否还存在相关的其他配置文件,杀掉该进程,再重启电脑。

macOS下malware移除之Qsearch变种劫持(Remove hijacking of Qsearch)_.net_05

Secondly, Remove the configuration file under the above path(reference according to the actual path you find), if any. Check if there are other related configuration files, kill the process, and restart the computer.

但针对本次的样本,在本地文件夹还可能有其它的一些恶意配置存在,需要一并移除,以免死灰复燃!

But for this sample, there are some other malicious configurations in the local folder, which need to be removed together to avoid resurgence!

~/Library/LaunchAgents/com.utilityData.plist
~/Library/LaunchAgents/com.UtilityParze.plist
~/Library/LaunchAgents/com.TabHelper.plist
~/Library/UpdatesMac
~/Library/TimeCheck
/Users/kevinstephen/Library/TabHelper/TabHelper.app
/Library/PrivilegedHelperTools/com.netease.uumac.helper
/Library/PrivilegedHelperTools/com.netease.uumac.helper*
Chrome/Default/Extensions/lfbenaabfliihodeianphjhhhcjgddlh

移除上面Chrome所对应的插件,可能会以其他名称显示。

Remove the plug-in corresponding to Chrome above, it may be displayed under another name.

实际上,上述文件对当前Mac系统的影响微乎其微,即使有误删,后期根据需要可以重新安装,所以删除不会影响系统的正常运行。

In fact, the above files have little impact on the current Mac system. Even if it is deleted by mistake, it can be reinstalled as needed later, so the deletion will not affect the normal operation of the system.

可疑文件全部移除完成后,最好重置浏览器,或者移除之前保存的状态数据

After all the suspicious files have been removed, it is best to reset the browser or remove the previously saved state data.

~/Library/Saved\\ Application\\ State/com.apple.Safari.savedState
~/Library/Saved\\ Application\\ State/com.google.Chrome.savedState

 

再启动查看是否恢复正常。

Restart to see if it returns to normal.

macOS下malware移除之Qsearch变种劫持(Remove hijacking of Qsearch)_ide_06

 

忠告:
Advice:
1,苹果电脑要更新和下载软件尽量去App Store,其他浏览器突然弹出的说电脑有问题或者软件需要更新,都尽量不要点!!!!

2,电脑设置中安全设置,选项选择只安装认证过的软件!!!

3,要使用破解版软件,就必须做好被安装广告和恶意插件的心理准备!

1, Apple computer to update and download software as far as possible to the App Store, other browsers suddenly pop up saying that the computer has a problem or the software needs to be updated, try not to point! ! ! !

2, the security settings in the computer settings, the option to choose only installed certified software! ! !

3. To use the cracked version of software, you must be mentally prepared to install advertisements and malicious plug-ins!

 

如果觉得本文对你有帮助,那就赞一个或者关注我吧,您的支持是我继续前进的动力!

If this article is helpful to you, please click like or comment on it. Your support is my motivation to move forward!