New Drive-by Download Campaign Spying on Users
SocGholish is a JavaScript malware framework that has been active since 2017. The term “Soc” in “SocGholish” refers to the use of social engineering toolkits masquerading as software updates to deploy malware on a victim’s system.
This malware framework uses several social engineering themes that impersonate browser and program updates such as Chrome/Firefox, Flash Player, and Microsoft Teams.
Threat Actors (TAs) host a malicious website (the site displays content to lure end-users with critical browser updates) that implements a drive-by-download mechanism, such as JavaScript code or Uniform Resource Locator (URL) redirections, to download an archive file that contains malware.
Being infected with SocGholish may result in the deployment of malware such as Cobalt Strike framework, ransomware, Information Stealers, RATs, etc.
The below figure depicts the infection chain used by the SocGholish framework.
Figure 1 – Infection chain of SocGholish
Technical Analysis
The infection chain begins once a user visits a compromised website that contains an injected HTML code which redirects them to a fake Chrome browser page to lure them into updating their Chrome application.
Once the user clicks the “Update” button on the fake page, an archive file named “Сhrome.Updаte.zip” is downloaded and saved in the “Downloads” folder.
The below figure shows a T1189
T1059
T1059
JavaScript
PowerShell
T1055
Process Injection
T1497
T1140
Virtualization/Sandbox Evasion
Deobfuscate/Decode Files or Information
T1105
Ingress Tool Transfer
Indicators of Compromise (IOCs)
Indicators | Indicator Type |
Description |
d5812e63327b5f5491c1a55c74737540 0af611819cd098c1ff3942431fc327dc75b83344 bad65408eb581fe39ded2637473bd4458b03e183ecc03164d6f8cf683a3e408e |
MD5 SHA1 Sha256 |
Archive file “Сhrome.Updаte.zip” |
dc123142cb787d395814027ff4046842 f4aaa317e23fb5446fc29fdbabfa4f0fc7090f59 520b8a64a11fdfb63d584e11ec1355cba6943cf102501fe4670c6429cdc13a61 |
MD5 SHA1 Sha256 |
Archive file “Сhrome.Updаte.zip” |
606df8a69873fcc00754a6bb245ab5ae 6842a4b32aa6a80c75bed4cdf09235c9a5f7e87b 6f0fac3b955e63f25bd199ec373c677152212fceda20d8bc6672cf62e68482e8 |
MD5 SHA1 Sha256 |
JavaScript file “AutoUpdater.js” |
eca593e95d2e919fb4b5f55b62b663df 406d6f811df8c0f9a16a36117be6772f25fcb214 1455c4250fea9a6a589ea23a60e130ab3f414a510d63cbf4eaf5693012d6272d |
MD5 SHA1 Sha256 |
JavaScript file “AutoUpdater.js” |
dad848c52d27ed20002825df023c4d7c 48e49867904d83b35361d6c5f809d16bc251f334 4a59ac7ae76abb86ab2e035adbe5253247a2aad9b1ce9f59b3145333e34c26f7 |
MD5 SHA1 Sha256 |
PS1 file “15.ico.ps1” |
252dce576f9fbb9aaa7114dd7150f320 c07f0a02c284b697dff119839f455836be39d10e b6b51f4273420c24ea7dc13ef4cc7615262ccbdf6f5e5a49dae604ec153055ad |
MD5 SHA1 Sha256 |
EXE file “whost.exe” |
hxxp://aeoi[.]pl/15.ico | URL | C&C server |
hxxp://aeoi[.]pl/21.ico | URL | C&C server |
149.248.8.148 | IP | C&C server |
94.158.247.32 | IP | C&C server |
Related
Source: https://blog.cyble.com/2022/09/21/netsupport-rat-distributed-via-socgholish/