NOTES:
ASSOCIATED FILE:
2026-02-02 (MONDAY): KONGTUKE CLICKFIX ACTIVITY LEADS TO ASYNC RAT START DATE/TIME OF THE ACTIVITY: - Monday 2026-02-02 at 27:49 UTC EXAMPLE OF LEGITIMATE BUT COMPROMISED SITE: - hxxps[:]//oceanbistrooumc[.]com/ EXAMPLE OF URL FROM INJECTED KONGTUKE SCRIPT: - hxxps[:]//soulversr[.]com/1d2g.js EXAMPLE OF FAKE CAPTCHA PAGE: - hxxps[:]//soulversr[.]com/js.php?device=windows& ip=[base64 text for victim's public IP address]& refferer=aHR0cHM6Ly9vY2VhbmJpc3Ryb291bWMuY29tLw==& browser=RWRnZQ==& ua=bW96aWxsYS81LjAgKHdpbmRvd3MgbnQgMTAuMDsgd2luNjQ7IHg2NCkgYXBwbGV3ZWJraXQvNTM3LjM2IChraHR tbCwgbGlrZSBnZWNrbykgY2hyb21lLzE0NC4wLjAuMCBzYWZhcmkvNTM3LjM2IGVkZy8xNDQuMC4wLjA=& domain=aHR0cHM6Ly9zb3VsdmVyc3IuY29t& loc=VVM=& is_ajax=1 EXAMPLE OF TRAFFIC AFTER RUNNING THE CLICKFIX SCRIPT INJECTED INTO CLIPBOARD: - 144.31.238[.]37:79 - Finger protocol traffic - 85.137.253[.]64:3456 - GET /o - 85.137.253[.]64:3456 - POST /m - :80 - sbwur1[.]top - GET /1.php?s=[information removed] - :80 - gecdfcjcbcmmakk[.]top - GET /9at1biglx5htr.php?[information removed] - 173.232.146[.]62:25658 - TLSv1.0 traffic - api.ipify[.]org - HTTPS traffic - 173.232.146[.]62:25658 - TLSv1.0 traffic - api.ipify[.]org - HTTPS traffic - 173.232.146[.]62:25658 - TLSv1.0 traffic - 173.232.146[.]62:25658 - TLSv1.0 traffic - hxxp[:]//checkip.dyndns[.]org/ - hxxp[:]//ipinfo[.]io/[victim's public IP address]/city - hxxp[:]//ipinfo[.]io/[victim's public IP address]/region - hxxp[:]//ipinfo[.]io/[victim's public IP address]/country - 173.232.146[.]62:25658 - TLSv1.0 traffic - Note: The pcap contains several failed DNS queries for numerous .top domains FILES RECOVERED FROM AN INFECTED WINDOWS HOST: - C:\Users\[username]\AppData\Roaming\script.ps1 - C:\Users\[username]\AppData\Roaming\Microsoft\321fa94650293031791ed45e9ea6b1d2 - C:\Users\[username]\AppData\Local\rootCert_lock.pfx - C:\Users\[username]\AppData\Local\WindowsUpdateCertificate.pfx SCHEDULED TASKS FROM AN INFECTED WINDOWS HOST: - Google_Maintenance_Worker - Set-SmbServerConfiguration



Click here to return to the main page.