<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>MacPaw — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/macpaw/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 07 May 2026 07:33:40 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/macpaw/feed.xml" rel="self" type="application/rss+xml"/><item><title>Mac Adware Injecting Malicious JavaScript via Obfuscated Python Script</title><link>https://feed.craftedsignal.io/briefs/2026-05-mac-adware-python/</link><pubDate>Thu, 07 May 2026 07:33:40 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-mac-adware-python/</guid><description>A Mac adware, likely a component of OSX.Pirrit, uses multiple layers of obfuscation, including base64 encoding, zlib compression, and variable renaming, to evade detection and inject malicious JavaScript from hxxps://1049434604.rsc.cdn77.org/ij1.min.js.</description><content:encoded><![CDATA[<p>This brief details the analysis of a persistent Mac adware sample, potentially a component of the OSX.Pirrit family, first brought to light by Paul Taykalo of MacPaw. The adware employs multiple layers of obfuscation, including compiled Python bytecode, base64 encoding, zlib compression, and variable renaming, to evade traditional antivirus detection. Initial analysis of the VtZkT sample showed it was initially undetected by most AV engines on VirusTotal. The adware persists via a launch item, executing a Python script that ultimately injects malicious JavaScript into web pages. The analysis highlights the techniques used to deobfuscate the code and reveal the adware&rsquo;s functionality, including the URL from which it downloads malicious JavaScript: hxxps://1049434604.rsc.cdn77.org/ij1.min.js.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The adware is likely installed via shareware installers or trojanized applications, such as fake Adobe Flash installers.</li>
<li>A bash script (CqfeP) is persisted as a launch item to ensure the adware is automatically started each time the user logs into their Mac.</li>
<li>The bash script changes directory to <code>/Users/&lt;user&gt;/Library/search.amp</code>.</li>
<li>The bash script executes a compiled Python script (5mLen) with the <code>f=</code> parameter specifying another file (6bLJC).</li>
<li>The 5mLen script decompresses and decodes the contents of 6bLJC, which contains base64 encoded and XORed data.</li>
<li>The decoded script replaces placeholders like <code>pid_REPLACE</code>, <code>script_to_inject_REPLACE</code>, and <code>MID_REPLACE</code> with values including a PID flag, the URL <code>hxxps://1049434604.rsc.cdn77.org/ij1.min.js</code>, and a machine identifier.</li>
<li>The script executes the resulting JavaScript via <code>osascript</code>, injecting it into the current user&rsquo;s web browser.</li>
<li>The injected JavaScript likely displays advertisements or redirects user traffic for malicious purposes.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>The adware injects malicious JavaScript into web browsers, potentially leading to unwanted advertisements, browser redirects, data theft, or other malicious activities. While the exact scope of the campaign is unknown, the use of obfuscation techniques suggests a deliberate attempt to evade detection and target a wide range of Mac users. The injected JavaScript can compromise user experience and potentially lead to further malware infections.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor for the execution of <code>osascript</code> with suspicious arguments, specifically those containing injected JavaScript, using the Sigma rule &ldquo;Detect JavaScript Injection via osascript&rdquo;.</li>
<li>Block network connections to <code>1049434604.rsc.cdn77.org</code> at the firewall or DNS resolver based on the IOC identified in this brief.</li>
<li>Monitor for the creation and execution of files within the <code>~/Library/search.amp</code> directory.</li>
<li>Inspect shell scripts executed from user LaunchAgents for suspicious python calls.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>adware</category><category>macos</category><category>python</category><category>javascript_injection</category></item></channel></rss>