SmartApeSG campaign uses ClickFix page to push Remcos RAT, (Sat, Mar 14th)
嗯,用户让我帮忙总结一下这篇文章的内容,控制在100字以内,而且不需要用“文章内容总结”之类的开头。首先,我需要仔细阅读这篇文章,理解它的主要内容。 这篇文章看起来是关于一个恶意软件感染的日记。作者在实验室里模拟了一个Remcos RAT的感染过程,这个感染来自SmartApeSG活动,使用了ClickFix式的虚假CAPTCHA页面。之前作者在2025年11月有过类似的分析,当时看到的是NetSupport Manager RAT,现在则主要是Remcos RAT。 文章详细描述了感染的过程:攻击者通过注入SmartApeSG脚本到合法网站中,生成一个虚假的CAPTCHA页面,诱导用户执行ClickFix脚本。然后通过Fiddler和Wireshark分析了网络流量,发现恶意软件以ZIP档案形式分发,并伪装成PDF文件。Remcos RAT利用DLL侧加载运行,并通过更新Windows注册表来保持持久性。 此外,文章还列出了多个指示器,包括注入的脚本URL、假CAPTCHA页面的域以及恶意软件分发和通信的URL。最后提到这些指标变化很快,但整体活动模式保持一致。 现在我要把这些信息浓缩到100字以内。重点包括:Remcos RAT感染、SmartApeSG活动、虚假CAPTCHA、ClickFix脚本、ZIP档案伪装成PDF、DLL侧加载、注册表持久化以及快速变化的指标。 可能需要这样组织语言:描述感染过程和机制,以及关键点如伪装和持久化方法。 最后检查字数是否在限制内,并确保没有使用不需要的开头语。 </think> 本文记录了一次实验室环境中的Remcos RAT感染事件,该感染由SmartApeSG活动发起,利用虚假CAPTCHA页面诱导用户执行ClickFix脚本。攻击者通过注入恶意脚本到合法网站生成假验证页面,并诱导用户下载伪装为PDF文件的ZIP档案。该档案包含Remcos RAT,并通过DLL侧加载运行。感染后,恶意软件通过更新Windows注册表实现持久化。 2026-3-14 01:19:49 Author: isc.sans.edu(查看原文) 阅读量:11 收藏

Introduction

This diary describes a Remcos RAT infection that I generated in my lab on Thursday, 2026-03-11. This infection was from the SmartApeSG campaign that used a ClickFix-style fake CAPTCHA page.

My previous in-depth diary about a SmartApeSG (ZPHP, HANEYMANEY) was in November 2025, when I saw NetSupport Manager RAT. Since then, I've fairly consistently seen what appears to be Remcos RAT from this campaign.

Finding SmartApeSG Activity

As previously noted, I find SmartApeSG indicators from the Monitor SG account on Mastodon, and I use URLscan to pivot on those indicators to find compromised websites with injected SmartApeSG script.

Details

Below is an image of HTML in a page from a legitimate but compromised website that shows the injected SmartApeSG script.


Shown above: Page from a legitimate but compromised site that highlights the injected SmartApeSG script.

The injected SmartApeSG script generates a fake CAPTCHA-style "verify you are human" page, which displays ClickFix-style instructions after checking a box on the page. A screenshot from this infection is shown below, and it notes the ClickFix-style script injected into the user's clipboard. Users are instructed to open a run window, paste the script into it, and hit the Enter key.


Shown above: Fake CAPTCHA page generated by a legitimate but compromised site, showing the ClickFix-style command.

I used Fiddler to reveal URLS from the HTTPS traffic, and I recorded the traffic and viewed it in Wireshark. Traffic from the infection chain is shown in the image below.


Shown above: Traffic from the infection in Fiddler and Wireshark.

After running the ClickFix-style instructions, the malware was sent as a ZIP archive and saved to disk with a .pdf file extension. This appears to be Remcos RAT in a malicious package that uses DLL side-loading to run the malware. This infection was made persistent with an update to the Windows Registry.


Shown above: Malware from the infection persistent on an infected Windows host.

Indicators of Compromise

Injected SmartApeSG script injected into page from legitimate but compromised site:

  • hxxps[:]//cpajoliette[.]com/d.js

Traffic to domain hosting the fake CAPTCHA page:

  • hxxps[:]//retrypoti[.]top/endpoint/signin-cache.js
  • hxxps[:]//retrypoti[.]top/endpoint/login-asset.php?Iah0QU0N
  • hxxps[:]//retrypoti[.]top/endpoint/handler-css.js?00109a4cb788daa811

Traffic generated by running the ClickFix-style script:

  • hxxp[:]//forcebiturg[.]com/boot  <-- 302 redirect to HTTPS URL
  • hxxps[:]//forcebiturg[.]com/boot  <-- returned HTA file
  • hxxp[:]//forcebiturg[.]com/proc  <-- 302 redirect to HTTPS URL
  • hxxps[:]//forcebiturg[.]com/proc  <-- returned ZIP archive archive with files for Remcos RAT

Post-infection traffic for Remcos RAT:

  • 193.178.170[.]155:443 - TLSv1.3 traffic using self-signed certificate

Example of ZIP archive for Remcos RAT:

  • SHA256 hash: b170ffc8612618c822eb03030a8a62d4be8d6a77a11e4e41bb075393ca504ab7
  • File size: 92,273,195 bytes
  • File type: Zip archive data, at least v2.0 to extract, compression method=deflate
  • Example of saved file location: C:\Users\[username]\AppData\Local\Temp\594653818\594653818.pdf

Of note, the files, URLs and domains for SmartApeSG activity change on a near-daily basis, and the indicators described in this article are likely no longer current. However, the overall patterns of activity for SmartApeSG have remained fairly consistent over the past several months.

---
Bradley Duncan
brad [at] malware-traffic-analysis.net


文章来源: https://isc.sans.edu/diary/rss/32796
如有侵权请联系:admin#unsafe.sh