{"id":19294,"date":"2022-06-08T14:10:03","date_gmt":"2022-06-08T22:10:03","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/06\/08\/news-13027\/"},"modified":"2022-06-08T14:10:03","modified_gmt":"2022-06-08T22:10:03","slug":"news-13027","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/06\/08\/news-13027\/","title":{"rendered":"MakeMoney malvertising campaign adds fake update template"},"content":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Wed, 08 Jun 2022 21:33:04 +0000<\/strong><\/p>\n<p>Malware authors and distributors are following the ebbs and flow of the threat landscape. One campaign we have tracked for a numbers of years recently introduced a new scheme to possibly completely move away from drive-by downloads via exploit kit.<\/p>\n<p>In this quick blog post, we will look at this new attack chain and link it with previous activity from what we believe are the same threat actors.<\/p>\n<h2>FakeUpdates (SocGholish) lookalike<\/h2>\n<p>Our researcher Fillip Mouliatis identified a malvertising campaign leading to a fake Firefox update. The template is strongly inspired from similar schemes and in particular the one distributed by the <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/04\/fakeupdates-campaign-leverages-multiple-website-platforms\/\" target=\"_blank\" rel=\"noreferrer noopener\">FakeUpdates<\/a> (<a href=\"https:\/\/www.proofpoint.com\/us\/learn-more\/attack-spotlight-fake-browser-updates\" target=\"_blank\" rel=\"noreferrer noopener\">SocGholish<\/a>) threat actors.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/template.png\" data-rel=\"lightbox-image-0\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"57308\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/makemoney-malvertising-campaign-adds-fake-update-template\/attachment\/template-3\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/template.png\" data-orig-size=\"992,696\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"template\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/template-300x210.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/template-600x421.png\" width=\"992\" height=\"696\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/template.png\" alt=\"\" class=\"wp-image-57308\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/template.png 992w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/template-300x210.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/template-600x421.png 600w\" sizes=\"auto, (max-width: 992px) 100vw, 992px\" \/><\/a><\/figure>\n<\/div>\n<p>However distribution and implementation are very different. Unlike FakeUpdates which uses compromised websites to push their template, this one is driven via malvertising. Please note the IP addresses involved in the redirection infrastructure as we will come back to them in a moment.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/traffic_.png\" data-rel=\"lightbox-image-1\" data-rl_title=\"\" data-rl_caption=\"\" title=\"\"><img decoding=\"async\" data-attachment-id=\"57310\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/makemoney-malvertising-campaign-adds-fake-update-template\/attachment\/traffic_-7\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/traffic_.png\" data-orig-size=\"779,654\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"traffic_\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/traffic_-300x252.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/traffic_-600x504.png\" loading=\"lazy\" width=\"779\" height=\"654\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/traffic_.png\" alt=\"\" class=\"wp-image-57310\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/traffic_.png 779w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/traffic_-300x252.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/06\/traffic_-600x504.png 600w\" sizes=\"auto, (max-width: 779px) 100vw, 779px\" \/><\/a><\/figure>\n<\/div>\n<p>The template itself is much more simplified and appears to be in development with a fake Firefox update that contains a couple of scripts that pull down an encrypted payload. The initial executable consists of a loader which retrieves a piece of Adware detected as BrowserAssistant. This payload was <a href=\"https:\/\/twitter.com\/FaLconIntel\/status\/1361918380429561859?s=20&amp;t=Z6ba1Gvn6H3IK0O9c4GBOw\" target=\"_blank\" rel=\"noreferrer noopener\">seen before<\/a> and interestingly through a similar malvertising campaign involving the RIG exploit kit.<\/p>\n<h2>MakeMoney connection<\/h2>\n<p>The malvertising infrastructure is essentially the same one that was used in numerous drive-by campaigns with exploit kits since late 2019. For some reason the threat actors are reusing the same servers in Russia and naming their malvertising gates after different ad networks.<\/p>\n<p>Security researcher <a href=\"https:\/\/twitter.com\/nao_sec\" target=\"_blank\" rel=\"noreferrer noopener\">@na0_sec<\/a> saw the &#8220;MakeMoney gate&#8221;, named after the domain makemoneywithus[.]work (<strong>188.225.75.54<\/strong>), <a href=\"https:\/\/twitter.com\/nao_sec\/status\/1314210377173880832\" target=\"_blank\" rel=\"noreferrer noopener\">redirect the Fallout exploit kit<\/a> in October 2020, although it <a href=\"https:\/\/twitter.com\/nao_sec\/status\/1332097156434391040\" target=\"_blank\" rel=\"noreferrer noopener\">mostly used RIG EK<\/a> for several years. Probably the earliest instance of this threat group was <a href=\"https:\/\/twitter.com\/nao_sec\/status\/1211975197219151876?s=20&amp;t=aJQIggmKWNS3V1TJ2tw8mA\" target=\"_blank\" rel=\"noreferrer noopener\">seen in December 2019<\/a> via the gate gettime[.]xyz (<strong>185.220.35.26)<\/strong>.<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"und\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/RigEK?src=hash&amp;ref_src=twsrc%5Etfw\">#RigEK<\/a> -&gt; <a href=\"https:\/\/twitter.com\/hashtag\/KPOT?src=hash&amp;ref_src=twsrc%5Etfw\">#KPOT<\/a><a href=\"https:\/\/t.co\/90qLX09BN1\">https:\/\/t.co\/90qLX09BN1<\/a> <a href=\"https:\/\/t.co\/wYzgr7VqFE\">pic.twitter.com\/wYzgr7VqFE<\/a><\/p>\n<p>&mdash; nao_sec (@nao_sec) <a href=\"https:\/\/twitter.com\/nao_sec\/status\/1211975197219151876?ref_src=twsrc%5Etfw\">December 31, 2019<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/div>\n<\/figure>\n<p>Looking at this infrastructure shows that the group reused a few servers quite predictably during these years between AS59504 vpsville and AS9123 TimeWeb. For example, gettime[.]xyz was hosted on the same server (185.220.35.26) as makemoneyeazzywith[.]me. Staying with the MakeMoney theme, we see makemoneywith[.]us on 188.225.75[.]54. That server was likely hosting a Keitaro TDS given such hostnames as keitarotrafficdelivery[.]xyz.<\/p>\n<p>There is also activity on <strong>185.220.33.3<\/strong>, <strong>185.230.140.210<\/strong> and <strong>188.225.75.54<\/strong> hosting a number of impersonation hostnames such as magicpropeller[.]xyz (PropellerAds), magicpopcash[.]xyz (PopCash).<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\"><img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.1.0\/72x72\/2139.png\" alt=\"\u2139\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> <a href=\"https:\/\/twitter.com\/hashtag\/RIGEK?src=hash&amp;ref_src=twsrc%5Etfw\">#RIGEK<\/a> drops <a href=\"https:\/\/twitter.com\/hashtag\/Redline?src=hash&amp;ref_src=twsrc%5Etfw\">#Redline<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/stealer?src=hash&amp;ref_src=twsrc%5Etfw\">#stealer<\/a><\/p>\n<p><img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.1.0\/72x72\/1f6a8.png\" alt=\"\ud83d\udea8\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> IOCs <img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.1.0\/72x72\/1f6a8.png\" alt=\"\ud83d\udea8\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/><br \/>Malvertising domains:<br \/>adsterramagic[.]me<br \/>magicadsterra[.]xyz<br \/>188.225.75[.]54<\/p>\n<p>RIG:<br \/>45.138.27[.]29<\/p>\n<p>Redline:<br \/>82dd6739ed808fd3231910c3aebf3ab9001c033cb7d28112174d5a19ab55a51f<br \/>185.215.113[.]121 <a href=\"https:\/\/t.co\/Pd6BWNeSfZ\">pic.twitter.com\/Pd6BWNeSfZ<\/a><\/p>\n<p>&mdash; Malwarebytes Threat Intelligence (@MBThreatIntel) <a href=\"https:\/\/twitter.com\/MBThreatIntel\/status\/1483235125827571715?ref_src=twsrc%5Etfw\">January 18, 2022<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/div>\n<\/figure>\n<p>We find it interesting that the same threat actors remained faithful to RIG EK for so long during a period where exploit kits were going out of business. They also seemed to poke fun at the same ad networks they were abusing, unless the choice for names associated with their gates was motivated by sorting out their upstream traffic.<\/p>\n<p>We don&#8217;t believe we have seen the last of this threat group. Having said that, their latest social engineering scheme could use some improvements to remove some blatant typos while their server-side infrastructure could be tidied up.<\/p>\n<h2>Indicators of Compromise<\/h2>\n<p><strong>IP addresses (malvertising domains, gates)<\/strong><\/p>\n<p>185.220.35.26<br \/>188.225.75.54<br \/>185.220.33.3<br \/>185.230.140.210<\/p>\n<p><strong>IP addresses (fake template)<\/strong><\/p>\n<p>188.227.107.121<br \/>188.227.107.92<\/p>\n<p><strong>Domains (malvertising domains, gates)<\/strong><\/p>\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\">\n<p>adcashtds2[.]xyz<br \/>adcashtdssystem[.]site<br \/>adsinside[.]xyz<br \/>adsterramagic[.]me<br \/>adstexx[.]xyz<br \/>allmagnew[.]xyz<br \/>alltomag[.]xyz<br \/>an-era[.]shop<br \/>ankgomag[.]xyz<br \/>anklexit[.]online<br \/>ankltrafficexit[.]xyz<br \/>ankmagicgo[.]xyz<br \/>blackexit[.]xyz<br \/>ccgmaining[.]life<br \/>ccgmaining[.]live<br \/>ccgmaining[.]work<br \/>clickadusweep[.]vip<br \/>clickadusweeps[.]vip<br \/>clickadutds[.]xyz<br \/>clicksdeliveryserver[.]space<br \/>clicktds2[.]xyz<br \/>cryptomoneyinside[.]xyz<br \/>cryptomoneyinsider[.]biz<br \/>cryptomoneyinsider[.]link<br \/>cryptomoneyinsider[.]site<br \/>cryptomoneyinsider[.]work<br \/>cryptomoneyinsiders[.]com<br \/>cryptomoneyinsiders[.]site<br \/>cryptomoneyinsiders[.]work<br \/>cryptomoneytds[.]xyz<br \/>cryptopaycard[.]shop<br \/>cryptosuite[.]pro<br \/>cryptosuitetds[.]com<br \/>cryptotraffic[.]vip<br \/>cryptotraffictds[.]online<br \/>cryptotraffictdss[.]xyz<br \/>cryptozerotds[.]xyz<br \/>daiichisankyo-hc[.]live<br \/>earncryptomoney[.]info<br \/>exitmagall[.]xyz<br \/>extradeliverytraffic[.]com<br \/>extramoneymaker[.]vip<br \/>familylabs[.]xyz<br \/>fujimi[.]fun<\/p>\n<\/p><\/div>\n<div class=\"wp-block-column\">\n<p>gettime[.]xyz<br \/>hilldeliveryexit[.]xyz<br \/>hillex[.]xyz<br \/>hilllandings[.]xyz<br \/>hillmag[.]xyz<br \/>hillmagnew[.]xyz<br \/>hilltopmagic[.]xyz<br \/>hilltoptds[.]xyz<br \/>hilltoptdsserver[.]xyz<br \/>hilltoptdsservers[.]fun<br \/>hilltoptrafficdelivery[.]com<br \/>hilltoptrafficdelivery[.]xyz<br \/>jillstuart-floranotisjillstu[.]art<br \/>k-to-kd[.]me<br \/>keitarotrafficdelivery[.]com<br \/>keitarotrafficdelivery[.]xyz<br \/>lahsahal[.]site<br \/>magcheckall[.]me<br \/>magicadss[.]xyz<br \/>magicadsterra[.]xyz<br \/>magicclickadu[.]xyz<br \/>magickhill[.]xyz<br \/>magickpeoplenew[.]xyz<br \/>magicpopcash[.]xyz<br \/>magicpropeller[.]xyz<br \/>magicself[.]xyz<br \/>magiczero[.]xyz<br \/>makemoneyeazzywith[.]me<br \/>makemoneynowwith[.]me<br \/>makemoneywith[.]us<br \/>makemoneywithus[.]work<br \/>mizuno[.]casa<br \/>money365[.]xyz<br \/>myallexit[.]xyz<br \/>myjobsy[.]com<br \/>nawa-store[.]com<br \/>newallfrommag[.]xyz<br \/>newzamenaadc[.]xyz<br \/>newzamenaclick[.]xyz<br \/>newzamenaself[.]xyz<br \/>newzamenazero[.]xyz<br \/>nippon-mask[.]site<br \/>northfarmstock[.]xyz<br \/>offers[.]myjobsy[.]com<\/p>\n<\/p><\/div>\n<div class=\"wp-block-column\">\n<p>offersstudioex[.]live<br \/>openphoto[.]xyz<br \/>partners[.]usemoney[.]xyz<br \/>prelandingpages[.]xyz<br \/>promodigital[.]me<br \/>propellermagic[.]xyz<br \/>sberbank[.]hourscareer[.]com<br \/>sberjob[.]hourscareer[.]com<br \/>selfadtracker1[.]online<br \/>selfadtrackerexit[.]xyz<br \/>selftraffictds[.]xyz<br \/>selfyourads[.]xyz<br \/>shop[.]mizuno[.]casa<br \/>supersports[.]fun<br \/>surprise[.]yousweeps[.]vip<br \/>tracker[.]usemoney[.]xyz<br \/>traffic[.]selfadtracker1[.]online<br \/>traffic[.]usemoney[.]xyz<br \/>trafficdeliveryclick[.]xyz<br \/>trafficdeliveryoffers[.]com<br \/>trafficdeliverysystem[.]world<br \/>traffictrackerself[.]xyz<br \/>tryphoto[.]xyz<br \/>trytime[.]xyz<br \/>usehouse[.]xyz<br \/>usemoney[.]life<br \/>usemoney[.]xyz<br \/>ymalljp[.]com<br \/>yousweeps[.]vip<br \/>zamenaad[.]xyz<br \/>zamenaclick[.]xyz<br \/>zamenahil[.]xyz<br \/>zamenazer[.]xyz<br \/>zapasnoiadc[.]xyz<br \/>zapasnoiclick[.]xyz<br \/>zapasnoiself[.]xyz<br \/>zapasnoizero[.]xyz<br \/>zermag[.]xyz<br \/>zernewmagcheck[.]xyz<br \/>zerocryptocard[.]shop<br \/>zeroexit[.]xyz<br \/>zerok2exit[.]xyz<br \/>zeroparktraffic[.]xyz<br \/>zeroparktrakeroutside[.]shop<br \/>zerotdspark[.]space<br \/>zerotracker[.]shop<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<h2>References<\/h2>\n<p>https:\/\/twitter.com\/MBThreatIntel\/status\/1483235125827571715<br \/>https:\/\/twitter.com\/MBThreatIntel\/status\/1361824286499950601<br \/>https:\/\/twitter.com\/malware_traffic\/status\/1412128664721014785<br \/>https:\/\/twitter.com\/malware_traffic\/status\/1357513424566124548<br \/>https:\/\/twitter.com\/FaLconIntel\/status\/1351739449932083200<br \/>https:\/\/twitter.com\/tkanalyst\/status\/1226125887256416256<br \/>https:\/\/twitter.com\/david_jursa\/status\/1346562997305696262<br \/>https:\/\/twitter.com\/nao_sec\/status\/1334289601125445633<br \/>https:\/\/twitter.com\/FaLconIntel\/status\/1298661757943087105<br \/>https:\/\/twitter.com\/nao_sec\/status\/1294871134001799168<br \/>https:\/\/twitter.com\/david_jursa\/status\/1232996830520193024<br \/>https:\/\/twitter.com\/david_jursa\/status\/1229354505583628288<br \/>https:\/\/twitter.com\/nao_sec\/status\/1211975197219151876<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/makemoney-malvertising-campaign-adds-fake-update-template\/\">MakeMoney malvertising campaign adds fake update template<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/makemoney-malvertising-campaign-adds-fake-update-template\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Threat Intelligence Team| Date: Wed, 08 Jun 2022 21:33:04 +0000<\/strong><\/p>\n<p>We catch up with some old acquaintances that just aren&#8217;t ready to hang up the towel just yet.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-intelligence\/2022\/06\/makemoney-malvertising-campaign-adds-fake-update-template\/\">MakeMoney malvertising campaign adds fake update template<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[18060,11692,251,12040],"class_list":["post-19294","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-fakeupdates","tag-rigek","tag-russia","tag-threat-intelligence"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19294","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19294"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19294\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19294"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19294"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19294"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}