SocGholish is a term I first saw in signatures from the EmergingThreats Pro ruleset to describe fake browser update pages used to distribute malware like a NetSupport RAT-based malware package or Chthonic banking malware. Although this activity has continued into 2020, I hadn’t run across an example until this week.
Fake browser update pages
The beginning of an infection chain starts with a legitimate website with injected code from a file sent by of its URLs. The URL most often ends with a .js. The injected code is highly-obfuscated, and I was unable to figure out where it came from on the legitimate site when I generated an infection in my lab. The end result looked like the image below.
Infection traffic was typical of what I’ve seen before with this campaign. The malware downloader is very picky. It knows which machines I’ve infected before, so when I use a computer that I’ve infected once or twice before, it won’t deliver the follow-up malware. Also, this .js-based downloader (or HTA-based downloader if you had a fake Chrome update page) is extremely VM-aware. It’s rare for me to get a full infection chain of events. In this case, I got the fake browser update page on one computer, then I switched to another computer to get Firefox.js to deliver the follow-up malware.
Shown above: Gate URLs and a fake Firefox update page from the SocGholish campaign shown in a Fiddler capture.
This NetSupport RAT-based malware package was sent as a 10MB ASCII text file consisting of hexadecimal characters. This is encoded data, and the file was saved to my lab host and decoded to a zip archive containing the malware package. This ASCII data and decoded zip archive were deleted from my infected lab host by the time I performed post-infection forensics.
The NetSupport RAT-based malware package was kept persistent through the Windows registry and stored in a folder under the infected user’s AppDataRoaming directory.
Indicators from the infection
Gate activity leading to fake browser update page:
- 130.0.234[.]134 port 443 – sodality.mandmsolicitors[.]com – URLs from gate domain (HTTPS)
Fake browser update page:
- 188.120.239[.]154 port 443 – trace.mukandratourandtravels[.]com – initial URL sent as HTTPS
- 188.120.239[.]154 port 80 – trace.mukandratourandtravels[.]com – follow-up URLs for fake browser update page
- Note: The domain name used for these fake update pages frequently changes.
URLs caused by Firefox.js (malware downloader):
- 130.0.233[.]178 port 80 – 2e2be1cd.auth.codingbit[.]co[.]in – POST /submit.aspx
- Note: The first part of the domain name (with the hex characters) is different for each infection.
Traffic generated by NetSupport RAT-based malware package:
- 81.17.21[.]98 port 443 – 81.17.21[.]98 – POST http://81.17.21[.]98/fakeurl.htm
- 62.172.138[.]35 port 80 – geo.netsupportsoftware[.]com – GET /location/loca.asp (not inherently malicious)
- File size: 32,231 bytes
- File name: Firefox.Update.4ee488.zip
- File description: Zip archive sent by fake browser update page
- Note: File name is different for each download (file hash might be as well)
- File size: 90,690 bytes
- File name: Firefox.js
- Note: File hash might be different on each occasion
- File size: 105,848 bytes
- File location: C:Users[username]AppDataRoamingXDk7Fyz6presentationhost.exe
- File description: NetSupport Manager RAT executable
This is a long-running campaign that continually evolves. To get an idea how it has changed since last year, view my previous ISC diary I wrote about this campaign in February 2019.
Computers running Windows 10 with the latest updates and recommended security settings are not very vulnerable to this threat. Default security settings for Chrome and Firefox usually block this activity. However, the criminals behind this campaign keep updating their tactics as they attempt to evade detection, and these fake browser pages sometimes slip through. If someone clicked through enough security warnings, they might very well infect a vulnerable Windows host.
The associated malware, along with a pcap and Fiddler capture of the traffic (.saz file) can be found here.
brad [at] malware-traffic-analysis.net
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.