home.social

#smartapesg — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #smartapesg, aggregated by home.social.

  1. 2026-04-23 (Thursday): #SmartApeSG campaign using #ClickFix instructions to push some sort of #RAT.

    I'm still not sure what this #malware is yet, but it looks like a RAT.

    Details, some more images, and a #pcap of the traffic are available at malware-traffic-analysis.net/2

  2. 2026-04-23 (Thursday): #SmartApeSG campaign using #ClickFix instructions to push some sort of #RAT.

    I'm still not sure what this #malware is yet, but it looks like a RAT.

    Details, some more images, and a #pcap of the traffic are available at malware-traffic-analysis.net/2

  3. 2026-04-23 (Thursday): #SmartApeSG campaign using #ClickFix instructions to push some sort of #RAT.

    I'm still not sure what this #malware is yet, but it looks like a RAT.

    Details, some more images, and a #pcap of the traffic are available at malware-traffic-analysis.net/2

  4. 2026-04-23 (Thursday): #SmartApeSG campaign using #ClickFix instructions to push some sort of #RAT.

    I'm still not sure what this #malware is yet, but it looks like a RAT.

    Details, some more images, and a #pcap of the traffic are available at malware-traffic-analysis.net/2

  5. 2026-04-23 (Thursday): #SmartApeSG campaign using #ClickFix instructions to push some sort of #RAT.

    I'm still not sure what this #malware is yet, but it looks like a RAT.

    Details, some more images, and a #pcap of the traffic are available at malware-traffic-analysis.net/2

  6. 2026-04-06 (Monday): #ClickFix activity from the #SmartApeSG campaign. Not sure what malware was sent through the fake CAPTCHA page is this time, but it's not the usual.

    A list of indicators, a #pcap of the traffic, malware samples and other files/info are available at malware-traffic-analysis.net/2

  7. 2026-04-06 (Monday): #ClickFix activity from the #SmartApeSG campaign. Not sure what malware was sent through the fake CAPTCHA page is this time, but it's not the usual.

    A list of indicators, a #pcap of the traffic, malware samples and other files/info are available at malware-traffic-analysis.net/2

  8. 2026-04-06 (Monday): #ClickFix activity from the #SmartApeSG campaign. Not sure what malware was sent through the fake CAPTCHA page is this time, but it's not the usual.

    A list of indicators, a #pcap of the traffic, malware samples and other files/info are available at malware-traffic-analysis.net/2

  9. 2026-04-06 (Monday): #ClickFix activity from the #SmartApeSG campaign. Not sure what malware was sent through the fake CAPTCHA page is this time, but it's not the usual.

    A list of indicators, a #pcap of the traffic, malware samples and other files/info are available at malware-traffic-analysis.net/2

  10. 2026-04-06 (Monday): #ClickFix activity from the #SmartApeSG campaign. Not sure what malware was sent through the fake CAPTCHA page is this time, but it's not the usual.

    A list of indicators, a #pcap of the traffic, malware samples and other files/info are available at malware-traffic-analysis.net/2

  11. 2026-01-22 (Thursday): #RemcosRAT infection persistent on an infected Windows host. This was caused by #ClickFix instructions from #SmartApeSG through a fake CAPTCHA page. Details of this #Remcos #RAT infection are available at malware-traffic-analysis.net/2

    I've also added three other blog entries from infections I generated in my lab on Tuesday, 2026-01-20. Those can be found at malware-traffic-analysis.net/2

    Those three other entries cover #LummaStealer, #VIPRecovery, and #Xworm. The VIP Recovery and Xworm infections followed the same chain of events, which includes #steganography through base64 text embedded in an image.

  12. 2026-01-06 (Tuesday): #SmartApeSG CAPTCHA page uses #ClickFix technique to push #RemcosRAT.

    The #Remcos #RAT C2 server is at 192.144.56[.]80.

    A #pcap of the traffic, the Remcos RAT #malware, and a list of indicators are available at malware-traffic-analysis.net/2

  13. 2025-12-29 (Monday): #ClickFix page leads to #NetSupportRAT infection.

    Details at www.malware-traffic-analysis.net/2025/12/29/index.html

    Of note, this is not from the usual ClickFix campaigns that I track. While #SmartApeSG has often pushed #NetSupport #RAT, this is a completely different vector for the initial URL.

    The initial sites.google[.]com URLs for this campaign are sent via email. But I don't have an example for this particular infection chain.

  14. I finished compiling the information for #Kongtuke #ClickFix activity using the finger command on 2025-12-11, and it's now live at www.malware-traffic-analysis.net/2025/12/11/index2.html

    I'd already posted the #SmartApeSG ClickFix activity using finger that same day, so now both are available.

    I had to run the ClickFix command on a physical host because the C2 server didn't like me when I initially tried it on a VM.

    Post-infection traffic looks like the same type of #AsyncRAT I've seen before, and some Tor traffic from whatever the follow-up malware is.

    It's a 221 MB zip archive containing the #pcap for the full infection, and it's about the same size as the zip archive containing forensic artifacts from the infected host.

  15. 2025-08-22 (Friday): #SmartApeSG for #NetSupport #RAT (#NetSupportRAT)

    Some sites have injected script that leads directly to the fake CAPTCHA page for #ClickFix instructions.

    Other sites have injected script that redirects to the URL for the fake CAPTCHA page.

    Direct example (compromised site --> script for CAPTCHA page):

    - hxxps[:]//mexicobusiness[.]news/
    - hxxps[:]//clouwave[.]net/ajax/pixi.min.js

    Recirect example (compromised site --> Redirect URL --> script for CAPTCHA page):

    - hxxps[:]//myvocabulary[.]com/
    - hxxps[:]//myevmanual[.]com/d.js <-- 302 found for next URL
    - hxxps[:]//clouwave[.]net/ajax/pixi.min.js

    Either way, you get the same CAPTCHA page.

    IOCs at github.com/malware-traffic/ind

    cc: @monitorsg

  16. 2025-08-20 (Wednesday): #SmartApeSG for fake #CAPTCHA page with #ClickFix instructions that led to an MSI file for #NetSupport #RAT and the #NetSupportRAT infection led to #StealCv2.

    Malware samples, a #pcap, and indicators at www.malware-traffic-analysis.net/2025/08/20/index.html

  17. 2025-07-15 (Tuesday): Tracking #SmartApeSG

    The SmartApeSG script injected into page from compromised website leads to #ClickFix style fake verification page. ClickFix-ing you way through this leads to a #NetSupportRAT infection.

    Compromised site (same as yesterday):

    - medthermography[.]com

    URLs for ClickFix style fake verification page:

    - warpdrive[.]top/jjj/include.js
    - warpdrive[.]top/jjj/index.php?W11WzmLj
    - warpdrive[.]top/jjj/buffer.js?409a8bdbd9

    Running the script for NetSupport RAT:

    - sos-atlanta[.]com/lal.ps1
    - sos-atlanta[.]com/lotu.zip?l=4773

    #NetSupport RAT server (same as yesterday):

    - 185.163.45[.]87:443

  18. 2025-07-14 (Monday): #SmartApeSG script injected into page from compromised website leads to #ClickFix style fake verification page. ClickFix-ing you way through this leads to a #NetSupportRAT infection.

    Compromised site:

    - medthermography[.]com

    URLs for ClickFix style fake verification page:

    - lebensversicherungvergleich[.]top/jjj/include.js
    - lebensversicherungvergleich[.]top/jjj/index.php?OtKXgPVX
    - lebensversicherungvergleich[.]top/jjj/buffer.js?4261984971

    Running the script for NetSupport RAT:

    - affordableasphalt-paving[.]com/lal.ps1
    - affordableasphalt-paving[.]com/lotu.zip?l=3526

    #NetSupport RAT server:

    - 185.163.45[.]87:443

  19. 2025-03-26 (Wednesday): #SmartApeSG traffic for a fake browser update page leads to a #NetSupport #RAT infection. A zip archive for #StealC sent over the #NetSupportRAT C2 traffic.

    The #StealC infection uses DLL side-loading by a legitimate EXE to #sideload the malicious DLL.

    A #pcap from an infection, the associated #malware samples, and #IOCs are available at at malware-traffic-analysis.net/2

  20. 2024-12-24 (Tuesday)

    #SmartApeSG infection chain starting with we-careu[.]xyz/work/original.js from compromised site.

    Ends with #NetSupport #RAT using the same 194.180.191[.]64 C2 address we've seen since November.

  21. 2024-12-17 (Tuesday): #SmartApeSG injected script leads to fake browser update page, and that page leads to a #NetSupport #RAT infection.

    Just like my last post here, there are 2 injected scripts in a page from the compromised site, one using using depostsolo[.]biz and one using tactlat[.]xyz.

    A #pcap of the infection traffic, associated malware samples and more information is available at malware-traffic-analysis.net/2

    NetSupportRAT C2 for this campaign continues to be 194.180.191[.]64 since as early as 2024-11-22.

    #FakeUpdates #NetSupportRAT

  22. 2024-12-13 (Friday): ww.anceltech[.]com compromised with #SmartApeSG leading to #NetSupport #RAT

    Saw 2 injected scripts, one for jitcom[.]info and best-net[.]biz.

    Pivoting on best-net[.]biz in URLscan show signs of six other possibly compromised sites: urlscan.io/search/#best-net.bi

    Those possibly compromised sites are:

    - destinationbedfordva[.]com
    - exceladept[.]com
    - thefilmverdict[.]com
    - thenapministry[.]com
    - www.estatesale-finder[.]com
    - www.freepetchipregistry[.]com

    I haven't tried them yet to confirm, but that's always been the case when I pivot on the SmartApeSG domains in URLscan.

    #NetSupportRAT C2 for this campaign since as early as 2024-11-22 has been 194.180.191[.]64