toad.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server operated by David Troy, a tech pioneer and investigative journalist addressing threats to democracy. Thoughtful participation and discussion welcome.

Administered by:

Server stats:

354
active users

#smartapesg

0 posts0 participants0 posts today

Detected #SmartApeSG infection chain

Compromised site
-->
gmt-a[.]shop/files/original.js (injected)
-->
gmt-a[.]shop/files/index.php (fakeupdate)
-->
gmt-a[.]shop/files/fill.php
-->
sundreammedia[.]com/HTCTL32.zip (zip)
-->
194[.]180.191.17:443 (NetSupport, DCVTTTUUEEW23, NSM896597)

d659315ca90d8f2e61b4fdc624b2f34d57dc5ccdd024e402088e3b7ffe6d45fa HTCTL32.zip

Detected #SmartApeSG infection chain

Compromised site
-->
searchweb[.]top/work/original.js (injected)
-->
searchweb[.]top/work/index.php (fakeupdate)
-->
searchweb[.]top/work/up.php
-->
experiments.autoblogging[.]ai/nsm_vpro.zip (zip)
-->
194[.]180.191.229:443 (NetSupport, DCVTTTUUEEW23, NSM896597)

1d016c7c7f1420749bb5d7c1d265ff7bebc59f0cc4aa487e546d7eed7ea0154b nsm_vpro.zip

Social media post I wrote for my employer at linkedin.com/posts/unit42_smar
and x.com/Unit42_Intel/status/1892

2025-02-18 (Tuesday): Legitimate but compromised websites with an injected script for #SmartApeSG lead to a fake browser update page that distributes #NetSupportRAT malware. During an infection run, we saw follow-up malware for #StealC. More info at github.com/PaloAltoNetworks/Un

A #pcap from the infection traffic, the associated malware, and other info are available at malware-traffic-analysis.net/2

2024-12-17 (Tuesday): #SmartApeSG injected script leads to fake browser update page, and that page leads to a #NetSupport #RAT infection.

Just like my last post here, there are 2 injected scripts in a page from the compromised site, one using using depostsolo[.]biz and one using tactlat[.]xyz.

A #pcap of the infection traffic, associated malware samples and more information is available at malware-traffic-analysis.net/2

NetSupportRAT C2 for this campaign continues to be 194.180.191[.]64 since as early as 2024-11-22.

2024-12-13 (Friday): ww.anceltech[.]com compromised with #SmartApeSG leading to #NetSupport #RAT

Saw 2 injected scripts, one for jitcom[.]info and best-net[.]biz.

Pivoting on best-net[.]biz in URLscan show signs of six other possibly compromised sites: urlscan.io/search/#best-net.bi

Those possibly compromised sites are:

- destinationbedfordva[.]com
- exceladept[.]com
- thefilmverdict[.]com
- thenapministry[.]com
- www.estatesale-finder[.]com
- www.freepetchipregistry[.]com

I haven't tried them yet to confirm, but that's always been the case when I pivot on the SmartApeSG domains in URLscan.

#NetSupportRAT C2 for this campaign since as early as 2024-11-22 has been 194.180.191[.]64

Detected #SmartApeSG infection chain

Compromised site
-->
modandcrackedapk[.]com/work/original.js (injected)
-->
modandcrackedapk[.]com/work/index.php (fakeupdate)
-->
modandcrackedapk[.]com/work/fix2.php
-->
modandcrackedapk[.]com/work/xxx.zip (zip)
-->
194[.]180.191.64:443 (NetSupport, XMLCTL, NSM303008)

b8f58a72f7d2733a07ac05eaa82da598ebc0ececfe3dbc21de5ca7d13cb8af4b xxx.zip

Fake Chrome update (#SmartApeSG). Threat actor packaged 10 malicious scripts for good measure.

blob:https://magydostravel[.]com/0d08ed5a-ce75-4ca6-b9f6-2593115ab032

seosuccesslab[.]com/cdn/wds.min.php

Payload (NetSupportRAT)
mangoairsoft[.]com/05e2f56dd5d8c33a6c402a19629be61c__9336ebf25087d91c818ee6e9ec29f8c1/