{"id":104247,"date":"2026-03-26T05:18:47","date_gmt":"2026-03-26T12:18:47","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=104247"},"modified":"2026-03-26T06:44:31","modified_gmt":"2026-03-26T13:44:31","slug":"osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/","title":{"rendered":"OSX\/Amos: Hunting C2s in Trojanized Electron ASAR Payloads"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"alignnone wp-image-104248 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2026\/03\/image1.png\" alt=\"Finder-style window highlighting an app.asar file with a magnifying glass, representing analysis of a trojanized Electron ASAR payload.\" width=\"640\" height=\"478\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2026\/03\/image1.png 640w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2026\/03\/image1-300x224.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2026\/03\/image1-150x112.png 150w\" sizes=\"(max-width: 640px) 100vw, 640px\" \/><\/p>\n<h2 style=\"margin-top: 1em; margin-bottom: 1em;\">Executive Summary<\/h2>\n<p>In March 2026, Intego Antivirus Labs investigated a macOS malware campaign delivering the <strong>OSX\/Amos<\/strong> stealer. During analysis, the infection chain led from stripped Mach-O binaries and heavily obfuscated shell scripts to an unusual final payload that appeared to be \u201cdata\u201d rather than a standard executable.<\/p>\n<p>That payload turned out to be an <strong>Electron ASAR (Atom Shell Archive)<\/strong> \u2014 a growing trend in macOS threats. Instead of shipping compiled binaries, attackers increasingly <strong>trojanize legitimate cross-platform Electron applications<\/strong> by replacing the core ASAR archive with a weaponized version that contains malicious logic.<\/p>\n<p>In this case, the trojanized app masqueraded as Ledger Live. It combined a <strong>TLS validation bypass<\/strong> with a convincing phishing overlay designed to capture cryptocurrency wallet <strong>Secret Recovery Phrases<\/strong> and exfiltrate them to attacker infrastructure.<\/p>\n<p>This write-up walks through a practical triage workflow to identify an ASAR payload, unpack it, locate the execution entry point, and extract actionable <strong>C2 infrastructure<\/strong>.<\/p>\n<h2 style=\"margin-top: 1em; margin-bottom: 1em;\">Identifying the ASAR archive<\/h2>\n<p>When a suspicious file doesn\u2019t present obvious magic headers, the fastest path forward is reading raw bytes. A quick hexdump revealed an Electron ASAR signature:<\/p>\n<p>hexdump -C -n 100 payload_file<\/p>\n<p>The key signal is a 16-byte header followed immediately by a JSON structure beginning with {&#8220;files&#8221;:{&#8230;}. That combination is an unmistakable ASAR fingerprint.<\/p>\n<p>Electron apps package internal source code (JavaScript\/HTML\/CSS) and assets into ASAR archives. The JSON block acts as a file allocation table mapping the virtual directory structure, followed by the raw bytes of each bundled file.<\/p>\n<p><strong>Why this matters:<\/strong> If the payload is an ASAR, you\u2019re likely looking at the <i>core logic<\/i> of a trojanized Electron application \u2014 including the code responsible for credential theft, UI overlays, and outbound network communication.<\/p>\n<h2 style=\"margin-top: 1em; margin-bottom: 1em;\">Extracting the payload<\/h2>\n<p>To analyze the JavaScript logic, the ASAR must be unpacked. In many analysis environments, npx asar extract isn\u2019t available, so it helps to have a second option.<\/p>\n<h3 style=\"margin-top: 1em; margin-bottom: 1em;\">Option A: Standard Node.js tooling (when available)<\/h3>\n<p>npx asar extract app.asar unpacked_asar<\/p>\n<h3 style=\"margin-top: 1em; margin-bottom: 1em;\">Option B: Python-based extraction (fast fallback on macOS)<\/h3>\n<p>If you have Python available, you can use the asar module to extract the archive.<\/p>\n<div style=\"background-color: #1155cc; padding: 1em; border-radius: 1em; color: #ffffff;\">Note: In clean lab environments, the exact install and invocation method may differ. The key goal is simply: <strong>extract the ASAR into a directory you can inspect.<\/strong><\/div>\n<p>Once extracted, you should end up with a directory that resembles a Node\/Electron project (including package.json and bundled Webpack output).<\/p>\n<h2 style=\"margin-top: 1em; margin-bottom: 1em;\">Finding the entry point<\/h2>\n<p>In an unpacked Electron app, the first stop is package.json. This file acts as the roadmap and dictates which code executes first.<\/p>\n<p>cat unpacked_asar\/package.json<\/p>\n<p>The critical field is:<\/p>\n<ul>\n<li>main: the application\u2019s entry point (for example: .\/.webpack\/main.bundle.js)<\/li>\n<\/ul>\n<p>This tells you exactly where to start hunting for injected logic.<\/p>\n<h2 style=\"margin-top: 1em; margin-bottom: 1em;\">Hunting the injection<\/h2>\n<p>In trojanized Electron bundles, threat actors often:<\/p>\n<ul>\n<li>inject logic <strong>at the top<\/strong> before the legitimate app bootstraps, or<\/li>\n<li>append an obfuscated block <strong>at the bottom<\/strong> (commonly via eval() patterns)<\/li>\n<\/ul>\n<p>In this sample, inspecting the start of the main bundle exposed the core compromise:<\/p>\n<p>head -c 1000 unpacked_asar\/.webpack\/main.bundle.js<\/p>\n<p>The \u201csmoking gun\u201d was the presence of an explicit TLS validation bypass:<\/p>\n<ul>\n<li>Electron command-line switch to ignore certificate errors<\/li>\n<li>NODE_TLS_REJECT_UNAUTHORIZED = &#8216;0&#8217;<\/li>\n<\/ul>\n<p>There is no legitimate reason for a production cryptocurrency wallet application to globally disable TLS certificate validation.<\/p>\n<h3 style=\"margin-top: 1em; margin-bottom: 1em;\">Why attackers do this<\/h3>\n<p>Stealer operators often rely on cheap, fast-changing infrastructure (expired, mismatched, or self-signed certificates). Without a TLS bypass, background exfiltration requests can throw certificate validation errors, crash the app, or create visible breakage that alerts the victim.<\/p>\n<p>This makes the bypass a practical \u201creliability layer\u201d for malicious traffic \u2014 and a useful detection clue for defenders.<\/p>\n<h2 style=\"margin-top: 1em; margin-bottom: 1em;\">Uncovering the phishing overlay and C2<\/h2>\n<p>Once the TLS bypass is identified, the next step is determining:<\/p>\n<ol>\n<li>what data is being collected, and<\/li>\n<li>where it\u2019s being sent<\/li>\n<\/ol>\n<p>In this case, the .webpack\/ directory contained suspicious overlay HTML files such as:<\/p>\n<ul>\n<li>recovery-step-1.html<\/li>\n<li>recovery-step-2.html<\/li>\n<li>recovery-step-3.html<\/li>\n<\/ul>\n<p>These files hijack the UI and prompt the user to \u201cverify\u201d their 12- or 24-word Secret Recovery Phrase.<\/p>\n<h3 style=\"margin-top: 1em; margin-bottom: 1em;\">Finding the exfiltration destination<\/h3>\n<p>To locate the drop zone, focus on data-sending primitives in the overlay files (fetch, XMLHttpRequest, submit, action=).<\/p>\n<p>grep -E -i -o &#8216;.{0,40}(action=|fetch\\(|XMLHttpRequest|submit).{0,40}&#8217; \\<\/p>\n<p>unpacked_asar\/.webpack\/recovery-step-*.html<\/p>\n<p>Then extract URLs from the specific file(s) of interest and filter out known legitimate namespaces.<\/p>\n<p>This workflow revealed the C2 endpoint used as the exfiltration drop zone:<\/p>\n<ul>\n<li>https:\/\/main.mon2gate.net\/modules\/wallets<\/li>\n<\/ul>\n<p>When the victim submits the final recovery step, the overlay sends the seed phrase to attacker infrastructure \u2014 and it succeeds silently because the TLS bypass prevents certificate failures from blocking the request.<\/p>\n<h2 style=\"margin-top: 1em; margin-bottom: 1em;\">The evolving stealer ecosystem<\/h2>\n<p>This isn\u2019t an isolated technique \u2014 it reflects a maturing macOS Malware-as-a-Service ecosystem. Trojanizing wallet applications by:<\/p>\n<ul>\n<li>disabling TLS validation, and<\/li>\n<li>injecting phishing overlays into Electron ASAR bundles<\/li>\n<\/ul>\n<p>has become a repeatable playbook across multiple stealer families.<\/p>\n<p>Attackers are also diversifying distribution. Beyond fake updates and cracked installers, recent campaigns have included novel delivery mechanisms designed to trick users \u2014 and in some cases, automated tools \u2014 into running the initial downloader.<\/p>\n<h2 style=\"margin-top: 1em; margin-bottom: 1em;\">Detection takeaways<\/h2>\n<p>Even without full reverse engineering, defenders can quickly identify high-signal indicators in trojanized Electron apps:<\/p>\n<ul>\n<li><strong>ASAR payloads<\/strong> where a suspicious \u201cdata\u201d file reveals {&#8220;files&#8221;:{&#8230;} structure<\/li>\n<li>package.json entry points that route into unusually modified Webpack bundles<\/li>\n<li>Global TLS bypass indicators (certificate ignore flags, NODE_TLS_REJECT_UNAUTHORIZED)<\/li>\n<li>Presence of overlay-style HTML pages prompting for secrets (seed phrases, credentials)<\/li>\n<li>Outbound requests to non-vendor domains from overlay UI code (especially fetch() destinations)<\/li>\n<\/ul>\n<h2 style=\"margin-top: 1em; margin-bottom: 1em;\">Indicators of Compromise<\/h2>\n<h3 style=\"margin-top: 1em; margin-bottom: 1em;\">File indicators<\/h3>\n<table>\n<tbody>\n<tr>\n<td style=\"text-align: center; background-color: #1155cc; color: #ffffff;\"><strong>Name<\/strong><\/td>\n<td style=\"text-align: center; background-color: #1155cc; color: #ffffff;\"><strong>SHA-256<\/strong><\/td>\n<td style=\"text-align: center; background-color: #1155cc; color: #ffffff;\"><strong>Context<\/strong><\/td>\n<\/tr>\n<tr>\n<td>ASAR payload<\/td>\n<td>eeb14ff7262367f8911<br \/>\n68268ca8d64a306968e57<br \/>\n9be1136cbd7a481076<br \/>\n98f405<\/td>\n<td>Trojanized Ledger Live app.asar containing overlay + TLS bypass<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3 style=\"margin-top: 1em; margin-bottom: 1em;\">Network and infrastructure<\/h3>\n<table style=\"height: 436px;\" width=\"1118\">\n<tbody>\n<tr>\n<td style=\"text-align: center; background-color: #1155cc; color: #ffffff;\"><strong>Type<\/strong><\/td>\n<td style=\"text-align: center; background-color: #1155cc; color: #ffffff;\"><strong>Indicator<\/strong><\/td>\n<td style=\"text-align: center; background-color: #1155cc; color: #ffffff;\"><strong>Context<\/strong><\/td>\n<\/tr>\n<tr>\n<td>C2 endpoint<\/td>\n<td>https:\/\/main.mon2gate.net\/<br \/>\nmodules\/wallets<\/td>\n<td>Exfiltration drop zone for stolen Secret Recovery Phrases<\/td>\n<\/tr>\n<tr>\n<td>Filesystem<\/td>\n<td>.webpack\/recovery-step-*.html<\/td>\n<td>Phishing overlay HTML injected into the application bundle<\/td>\n<\/tr>\n<tr>\n<td>VT collection<\/td>\n<td>https:\/\/www.virustotal.com\/<br \/>\ngui\/collection\/fcdb78d87<br \/>\nf1e094d4d4a6dacaa70<br \/>\n38f3274291448704e<br \/>\n7913c390d6492002<br \/>\n11e\/summary<\/td>\n<td>Curated indicators and artifacts<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 style=\"margin-top: 1em; margin-bottom: 1em;\">What to know and what to do<\/h2>\n<p>Trojanized Electron apps are a reminder that macOS malware analysis increasingly requires web-application triage techniques \u2014 not only executable reversing. Being able to unpack ASAR archives, trace package.json entry points, and spot environment manipulations like TLS bypasses is key to extracting actionable IOCs quickly.<\/p>\n<p>For responders, the highest-value workflow is often: <strong>identify ASAR \u2192 unpack \u2192 find entry point \u2192 hunt injected logic \u2192 extract C2 from overlay\/exfil code<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Executive Summary In March 2026, Intego Antivirus Labs investigated a macOS malware campaign delivering the OSX\/Amos stealer. During analysis, the infection chain led from stripped Mach-O binaries and heavily obfuscated shell scripts to an unusual final payload that appeared to be \u201cdata\u201d rather than a standard executable. That payload turned out to be an Electron [&hellip;]<\/p>\n","protected":false},"author":115,"featured_media":104248,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[190],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Executive Summary In March 2026, Intego Antivirus Labs investigated a macOS malware campaign delivering the OSX\/Amos stealer. During analysis, the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OSX\/Amos: Hunting C2s in Trojanized Electron ASAR Payloads - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Executive Summary In March 2026, Intego Antivirus Labs investigated a macOS malware campaign delivering the OSX\/Amos stealer. During analysis, the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-26T12:18:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-26T13:44:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2026\/03\/image1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"478\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Frederic Blaison\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2026\/03\/image1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2026\/03\/image1.png\",\"width\":640,\"height\":478,\"caption\":\"Finder-style window highlighting an app.asar file with a magnifying glass, representing analysis of a trojanized Electron ASAR payload.\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/\",\"name\":\"OSX\/Amos: Hunting C2s in Trojanized Electron ASAR Payloads - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#primaryimage\"},\"datePublished\":\"2026-03-26T12:18:47+00:00\",\"dateModified\":\"2026-03-26T13:44:31+00:00\",\"description\":\"Executive Summary In March 2026, Intego Antivirus Labs investigated a macOS malware campaign delivering the OSX\/Amos stealer. During analysis, the\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OSX\/Amos: Hunting C2s in Trojanized Electron ASAR Payloads\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/08c0037f7ab259cf049d6c332f30c5b2\"},\"headline\":\"OSX\/Amos: Hunting C2s in Trojanized Electron ASAR Payloads\",\"datePublished\":\"2026-03-26T12:18:47+00:00\",\"dateModified\":\"2026-03-26T13:44:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#webpage\"},\"wordCount\":1100,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2026\/03\/image1.png\",\"articleSection\":[\"Malware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/08c0037f7ab259cf049d6c332f30c5b2\",\"name\":\"Frederic Blaison\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0f7a55283c5b8924a7e54b5d6191cd80?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0f7a55283c5b8924a7e54b5d6191cd80?s=96&d=mm&r=g\",\"caption\":\"Frederic Blaison\"},\"description\":\"Frederic is Intego\\u2019s Antivirus Labs Tech Lead, overseeing research into macOS malware and persistent threats. With over 30 years of expertise in Apple technologies, Fred\\u2019s background spans system administration, QA, and hands-on malware analysis, bringing deep technical insight to the front lines of macOS security.\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Executive Summary In March 2026, Intego Antivirus Labs investigated a macOS malware campaign delivering the OSX\/Amos stealer. During analysis, the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/","og_locale":"en_US","og_type":"article","og_title":"OSX\/Amos: Hunting C2s in Trojanized Electron ASAR Payloads - The Mac Security Blog","og_description":"Executive Summary In March 2026, Intego Antivirus Labs investigated a macOS malware campaign delivering the OSX\/Amos stealer. During analysis, the","og_url":"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/","og_site_name":"The Mac Security Blog","article_published_time":"2026-03-26T12:18:47+00:00","article_modified_time":"2026-03-26T13:44:31+00:00","og_image":[{"width":640,"height":478,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2026\/03\/image1.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Frederic Blaison","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2026\/03\/image1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2026\/03\/image1.png","width":640,"height":478,"caption":"Finder-style window highlighting an app.asar file with a magnifying glass, representing analysis of a trojanized Electron ASAR payload."},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/","name":"OSX\/Amos: Hunting C2s in Trojanized Electron ASAR Payloads - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#primaryimage"},"datePublished":"2026-03-26T12:18:47+00:00","dateModified":"2026-03-26T13:44:31+00:00","description":"Executive Summary In March 2026, Intego Antivirus Labs investigated a macOS malware campaign delivering the OSX\/Amos stealer. During analysis, the","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"OSX\/Amos: Hunting C2s in Trojanized Electron ASAR Payloads"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/08c0037f7ab259cf049d6c332f30c5b2"},"headline":"OSX\/Amos: Hunting C2s in Trojanized Electron ASAR Payloads","datePublished":"2026-03-26T12:18:47+00:00","dateModified":"2026-03-26T13:44:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#webpage"},"wordCount":1100,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2026\/03\/image1.png","articleSection":["Malware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/osx-amos-hunting-c2s-in-trojanized-electron-asar-payloads\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/08c0037f7ab259cf049d6c332f30c5b2","name":"Frederic Blaison","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/0f7a55283c5b8924a7e54b5d6191cd80?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0f7a55283c5b8924a7e54b5d6191cd80?s=96&d=mm&r=g","caption":"Frederic Blaison"},"description":"Frederic is Intego\u2019s Antivirus Labs Tech Lead, overseeing research into macOS malware and persistent threats. With over 30 years of expertise in Apple technologies, Fred\u2019s background spans system administration, QA, and hands-on malware analysis, bringing deep technical insight to the front lines of macOS security.","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/frederic-blaison\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2026\/03\/image1.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-r7p","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/104247"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/115"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=104247"}],"version-history":[{"count":22,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/104247\/revisions"}],"predecessor-version":[{"id":104272,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/104247\/revisions\/104272"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/104248"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=104247"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=104247"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=104247"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}