2019-04-05 - QUICK POST: FAKE UPDATES CAMPAIGN PUSHES CHTHONIC BANKING TROJAN
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
FILES:
- 2019-04-05-Fake-Updates-Campaign-pushes-Chthonic.pcap.zip 6.7 MB (6,744,016 bytes)
- 2019-04-05-Fake-Updates-Campaign-malware-and-artifacts.zip 582 kB (582,082 bytes)
- 2019-04-05-Fake-Updates-Campaign-indicators.txt.zip 2.0 kB (1,968 bytes)
ANOTHER EXAMPLE OF THE FAKE UPDATES PAGE CAPTURED IN FIDDLER:
- 2019-04-05-fake-updates-campaign-from-www.med.ufro.cl.saz.zip 3.5 MB (3,487,501 bytes)
IMAGES
Shown above: Example of fake Chrome update page when using the Chrome web browser.
Shown above: Link from fake update page appears to retrieve info from original site that kicked off this infection chain.
Shown above: Downloaded .js file. The last six hexadecimal characters before .js in the file name are different for each download.
Shown above: Traffic from an infection filtered in Wireshark.
Shown above: Artifacts from an infected Windows host.
Shown above: Chthonic banking Trojan persistent on an infected Windows host.
Click here to return to the main page.