NOTES:
ASSOCIATED FILES:
2025-01-28 (TUESDAY): KONGTUKE AND SOC GHOLISH STYLE WEB INJECTS NOTES: - The compromised site had injected script for KongTuke leading to a fake captcha page. - The compromised site also had injected script that generated Soc Gholish style traffic for a fake browser update page. - I was unable to get the KongTuke Script to do anything other than the initial URL from the copy/paste script. - I was able to get an infection from the other Soc Gholish style infection chain. 1) KONGTUKE URLS FOR FAKE CAPTCHA PAGE: - hxxps[:]//sesraw[.]com/5a2w.js <-- injected script in compromised website - hxxps[:]//sesraw[.]com/js.php?device=windows&[other parameters with base64-encoded values] URL IN COPY/PASTE POWERSHELL SCRIPT FROM FAKE CAPTCHA PAGE: - hxxps[:]//compaq-hr-buyers-where.trycloudflare[.]com/cloudfla NOTES: - The copy/paste script returned a PowerShell file with a SHA256 hash of 17db9d121fb3eb5033307fdb53df67402bcbc9d8970f45d8142b78c83769b7af - It didn't do anything further when I tested this KongTuke infection chain in my lab environment. 2) SOC GHOLISH STYLE INJECT AND FAKE BROWSER UPDATE PAGE: - hxxps[:]//147.45.47[.]98/js/error.js <-- injected script in compromised website - hxxps[:]//circle.innovativecsportal[.]com/cL2QAwuf82oUn6oxR4S8IQKfqiEV2v1uB8rjaBTT+WEfz+dkUsA= - hxxps[:]//circle.innovativecsportal[.]com/w0szdbhpUBynaQlH9HIfV7A/VgXhcREUrSpfDLkubBOzaR9XsWkJV6s7XwOuIEYatypKH7kvQRy0aU4= - hxxps[:]//circle.innovativecsportal[.]com/MuPfv0nBvNZWweWNBdrznUGXus8Q2f3TU4271lyEgNlbj7qdHsGtnQjBq9hTjKbLW4uyxV+bqdVZjf3C EXAMPLE OF DOWNLOADED ZIP AND EXTRACTED JS FILE WHEN USING MICROSOFT'S EDGE BROWSER: - SHA256 hash: 661542aa14ee61a2e5a2552db9c2a3995474208d6962c822b53ba93402932a7b - File size: 1,649 bytes - File name: Update.zip - File type: Zip archive data, at least v2.0 to extract - SHA256 hash: f8ee2a0ff206c40aac5b18030da151e8bbf1100d3a68d2b0cd24aff634d31cca - File size: 4,324 bytes - File name: Update.js - File type: ASCII text, with very long lines, with no line terminators EXAMPLE OF DOWNLOADED JS FILE WHEN USING GOOGLE'S CHROME BROWSER: - SHA256 hash: e5a023ccd4adb57f0f574fdc127b7c09e9f9d57272f44b4f4bea107646b8a657 - File size: 4,205 bytes - File name: Update.js - File type: ASCII text, with very long lines, with no line terminators NOTE: - The file hashes and sizes are different for each download of these fake web browser "update" files. EXAMPLE OF INFECTION TRAFFIC FROM RUNNING ONE OF THE EXTRACTED JS FILES: - Date/Time of the infection traffic: 2025-01-29 01:35:26 UTC - 64.52.80[.]229 - hxxp[:]//fubuzbvy23nnn[.]top/f78.svg - 45.61.136[.]218 - hxxp[:]//fmnljjmaeihehge[.]top/f%20mzioj%20m.php?s=578 - 45.61.136[.]218 - hxxp[:]//fmnljjmaeihehge[.]top/nexdplitf0htr.php?id=DESKTOP-LQCS5F2&key=74255137276&s=578 - tcp://86.107.101[.]93:25658 - TLSv1.0 traffic - hxxps[:]//api.ipify[.]org/ TWO SCHEDULED TASKS ON INFECTED WINDOWS CLIENT: - Task name: Get-MpPreference - Task triggers: 12:00 AM on day of infection, repeats every 3 minutes indefinitely - Task action: [see IOC file for details] - Task name: Google_Maintenance_Worker - Task triggers: At log on of any user - Task action: [see IOC file for details] FILES FOUND ON INFECTED WINDOWS CLIENT: - C:\Users\[username]\AppData\Local\rootCert_lock.pfx - C:\Users\[username]\AppData\Local\WindowsUpdateCertificate.pfx - C:\Users\[username]\AppData\Roaming\Microsoft\297e93457054a098012a902134bccde8 <-- 21.8 MB of base64 text
Shown above: Injected KongTuke script leading to fake captcha page.
Shown above: Copy/paste script from fake captcha page.
Shown above: Injected script leading to Soc Gholish style fake browser update.
Shown above: Fake browser update page in web browser.
Shown above: Traffic from an infection filtered in Wireshark.
Click here to return to the main page.