2025-06-18: SmartApeSG to ClickFix lure to NetSupport RAT to StealC v2
2025年6月18日,SmartApeSG通过ClickFix诱饵引导用户执行恶意脚本,进而加载NetSupport RAT并运行StealC v2窃取信息。 2025-6-19 04:11:0 Author: www.malware-traffic-analysis.net(查看原文) 阅读量:17 收藏

2025-06-18 (WEDNESDAY): SMARTAPESG --> CLICKFIX LURE --> NETSUPPORT RAT --> STEALC V2

NOTICE:

  • Zip files are password-protected.  Of note, this site has a new password scheme.  For the password, see the "about" page of this website.

ASSOCIATED FILES:

NOTES

SMARTAPESG NOTES:

CLICKFIX NOTES:

  • ClickFix is nickname for a social engineering technique that has been increasingly popular since 2024.
  • ClickFix is spread through compromised websites or malicious pages linked from emails, social media or other distribution.
  • This technique uses clipboard hijacking to deliver malicious commands or script to potential victims.
  • ClickFix style pages instruct potential victims to paste malicious content into a Run window or Terminal window.
  • The malicious command/script is often (but not always) PowerShell-based and is designed to infect computers with malware.

NETSUPPORT RAT NOTES:

STEALC V2 NOTES:

INDICATORS OF COMPROMIMSE

DATE/TIME OF INFECTION:

  • Wednesday, June 18th, 2025 at 16:28 UTC

INFECTION CHAIN OF EVENTS:

  • legitimate but compromised website --> ClickFix lure --> loads/runs NetSupport RAT --> loads/runs StealC v2

LEGITIMATE BUT COMPROMISED WEBSITE:

  • hxxps[:]//www.textingworld[.]com/

URL FROM SCRIPT INJECTED INTO PAGE FROM COMPROMISED WEBSITE:

  • hxxps[:]//islonline[.]org/d.js

TRAFFIC FOR CLICKFIX FAKE VERIFICATION PAGE:

  • hxxps[:]//lqsword[.]top/lsg/buf.js
  • hxxps[:]//lqsword[.]top/lsg/index.php?KL3FXuWo
  • hxxps[:]//lqsword[.]top/lsg/bof.js?cf93564fb65c423b1f

TRAFFIC FROM PASTED SCRIPT TO RETRIEVE THE NETSUPPORT RAT PACKAGE:

  • hxxps[:]//pastebin[.]com/raw/A2gYf8nC
  • hxxps[:]//eddereklam[.]com/tuqw.zip?le=32

ZIP ARCHIVE WITH NETUPPORT RAT PACKAGE:

  • SHA256 hash: 36e7bd2c91d895030d520978ad57fca3a97f5889f2ed15bd3463f32f6fdf089e
  • File size: 11,004,898 bytes
  • File type: Zip archive data, at least v2.0 to extract, compression method=deflate
  • File location: hxxps[:]//eddereklam[.]com/tuqw.zip?le=32

NETSUPPORT RAT C2 TRAFFIC (UNENCRYPTED HTTP OVER TCP PORT 443):

  • 94.158.245[.]135 port 443 - 94.158.245[.]135 - POST hxxp[:]//94.158.245[.]135/fakeurl.htm HTTP/1.1 (application/x-www-form-urlencoded)

STEALC V2 PACKAGE SENT OVER NETSUPPORT RAT C2 TRAFFIC AND SAVED TO DISK:

  • SHA256 hash: 369c18819a35e965c83cdeab07f92eecf69a401030dd8021cb118c9c76176f31
  • File size: 6,005,752 bytes
  • File type: Zip archive data, at least v2.0 to extract, compression method=deflate
  • File location: C:\Users\Public\mir2.zip

SELECT FILES IN ABOVE ZIP ARCHIVE FOR STEALC V2:

  • SHA256 hash: db9910cb5a44399df2c428998376300aad28329b3af640aeba484f31732092c7
  • File size: 28,416 bytes
  • File type: PE32+ executable (GUI) x86-64, for MS Windows
  • File name: mfpmp.exe
  • File description: Copy of legitimate Microsoft Windows file, Media Foundation Protected Pipeline EXE
  • NOTE: This is not a malicious file, but it loads/runs any file named rtworkq.dll in the same directory/path.
  • SHA256 hash: 13fe3c1072ce308192994f2d7b329f7c8cbb192d49bdb538872383192d133ebb
  • File size: 704,077,312 bytes
  • File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
  • File name: rtworkq.dll
  • File description: Inflated/padded DLL (704 MB) for StealC v2 that is side-loaded by mfpmp.exe.

ABOVE DLL FOR STEALC V2 WITH THE PADDING REMOVED

  • SHA256 hash: 0f9159e63431423e90e2404b8a26da5ec6dbaf819e0f15658c57bb44b9ff1d4f
  • File size: 1,531,392 bytes
  • File type: PE32+ executable (DLL) (GUI) x86-64, for MS Windows
  • File description: Above rtworkq.dll file with the padding removed

STEALC V2 DATA EXFILTRATION TRAFFIC (UNENCRYPTED HTTP OVER TCP PORT 80):

  • 83.229.17[.]68 port 80 - 83.229.17[.]68 - POST /b1dce4d14b894c9e.php HTTP/1.1 , JSON (application/json)

IMAGES


Shown above:  Page from compromised website with injected SmartApeSG script that led to a ClickFix page.


Shown above:  ClickFix page presenting instructions to paste script into Run window.


Shown above:  Traffic from the infection filtered in Wirehark.

Click here to return to the main page.


文章来源: https://www.malware-traffic-analysis.net/2025/06/18/index.html
如有侵权请联系:admin#unsafe.sh