esaleerugs[.]com/e365r.js
ilsotto[.]com/n934rhj.js
nastictac[.]com/365h.js
Likely next #Landupdate808 / #Kongtuke infra:
rshank[.]com
Still was never able to get a payload from the last reported infra, vicrin[.]com
Observed a new beginning part of the delivery chain for #LandUpdate808
hxxps[:]//mercro[.]com/web-metrics.js
Found in Silent Push. Can't get the next part yet.
I just don't use Censys as much as I should. Crafted something that does reasonably well at spotting #KongTuke #LandUpdate808 hosts.
services.http.response.body_hash="sha1:4cb2c207d5a9bb582aa3ddd06786d1afa0d8bada" and services.software.vendor=`Ubuntu`
Just wish there was a method to filter to just results with hostnames.
Looks to me like cloudy[.]zone will likely end up part of this threat.
Latest #LandUpdate808 killchain observed today:
victim site
-->
pushcd[.]com/web-analyzer.js
-->
cloudflare[.]com/cdn-cgi/trace (checking IP info)
-->
pushcg[.]com/js.php?device=windows&ip=[IP INFO]&refferer=[REFERRER URL]&browser=chrome&ua=[USER AGENT]&domain=[C2 DOMAIN]&loc=VVM=&is_ajax=1
-->
contactsyracuse[.]org/wp-admin/js/qrtz.php
-->
upd_1794921.exe (2fa83a1f4b3196a87645d4e71c3a486c7eb433ccb462c85888d5a5dee2abe2e2)
Other stage 2 domain found:
dealmakerwealthsociety[.]com/wp-content/plugins/qartz.php
Darkgate Config:
Darkgate Version: 6.9.2
Campaign ID: new10oct
C2: 91.222.173[.]80
#LandUpdate808 domain found in research, not from anything injected into a compromised site.
greyspartners[.]com/analytics.js
As seen here:
https://urlscan.io/result/0503f332-9a1d-4371-a54a-4451dbfded79/#summary
Observed new #LandUpdate808 infection chain.
Compromised site:
-->
bretagne-balades[.]com/wp-includes/css/539.php (Update_#######.msix)
-->
45[.]11.59.217:443 (NetSupport, NSM301071)
4c2f8feced7768f756ac7d4fa633b08fd61f0ba198c860fa4f1093dedbf060d2 Update_#######.msix