{"id":1071,"date":"2024-08-29T01:37:22","date_gmt":"2024-08-29T01:37:22","guid":{"rendered":"https:\/\/xdr-mdr.lmntrix.com\/main_web\/?p=1071"},"modified":"2025-07-28T13:48:43","modified_gmt":"2025-07-28T13:48:43","slug":"this-aint-no-disco-fireball-malware-corrupts-250-million-users","status":"publish","type":"post","link":"https:\/\/lmntrix.com\/blog\/this-aint-no-disco-fireball-malware-corrupts-250-million-users\/","title":{"rendered":"This ain\u2019t no disco \u2013 Fireball malware corrupts 250 million users"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"281\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/this-aint-no-disco-fireball-malware-feature-image.jpg\" alt=\"\" class=\"wp-image-1083\"\/><\/figure>\n<\/div>\n\n\n<p>A new strain of Chinese malware, dubbed Fireball by researchers, has recently been discovered on more than 250 million computers around the globe. Indian machines are the most heavily infected (10 per cent), followed by Brazil, Mexico and Indonesia (Nine, six and five per cent respectively).<\/p>\n\n\n\n<p>Once installed, Fireball hijacks internet browsers, effectively turning them into zombies. Currently, the malware\u2019s aim is to install plugins and other configurations to enhance ad performance and manipulating traffic in order to increase advertising revenue.<\/p>\n\n\n\n<p>While in its current form Fireball seems relatively benign, it has the security community worried as it has the capability to serve any other PUA (potentially unwanted application).<\/p>\n\n\n\n<p>Researchers have linked the malware to a Chinese advertising agency named Rafotech.<\/p>\n\n\n\n<p>Below is a technical analysis we\u2019ve conducted on Fireball\u2019s code \u2013 the sample hashes are below:<br><br><strong>FAB40A7BDE5250A6BC8644F4D6B9C28F<br><br>69FFDF99149D19BE7DC1C52F33AAA651<br><br>B56D1D35D46630335E03AF9ADD84B488<br><br>8C61A6937963507DC87D8BF00385C0BC<br><br>7ADB7F56E81456F3B421C01AB19B1900<\/strong><br><br>This set contains three dll files and two exe files. We started our analysis with exe files.<br><br>MD5: 69FFDF99149D19BE7DC1C52F33AAA651<br><br>After digging into static analysis of the sample, one of the first things we saw was a suspicious URL inside the strings.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/this-aint-no-disco-fireball-malware-img1.png\" alt=\"\"\/><figcaption class=\"wp-element-caption\"><em>Figure 1 Suspicious URL in strings<\/em><\/figcaption><\/figure>\n\n\n\n<p>We then ran the suspicious URL in Virus Total, here are the results:<br><br><a href=\"https:\/\/virustotal.com\/en\/url\/28e8eec84c1342d64f8b20b2624e095f5fdddd7329b90b53dcf5adeba7cc2af4\/analysis\/1496656286\/\" target=\"_blank\" rel=\"noopener\">https:\/\/virustotal.com\/en\/url\/28e8eec84c1342d64f8b20b2624e095f5fdddd7329b90b53dcf5adeba7cc2af4\/analysis\/1496656286\/<\/a><br><br><strong>URL Scanner&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Result<\/strong><br><br>Dr.Web&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Malicious site<br><br>Avira (no cloud)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Malware site<br><br>Fortinet&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Malware site<br><br>Kaspersky&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Malware site<br><br>Sangfor&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Malware site<br><br>The above five vendors were the only ones out of 65 who flagged this site as a malware site.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/this-aint-no-disco-fireball-malware-img2.png\" alt=\"\"\/><figcaption class=\"wp-element-caption\"><em>Figure 2 Suspicious URL found in the stack<\/em><\/figcaption><\/figure>\n\n\n\n<p>Additionally, we encountered registry traces in the code which led to an image file execution entry.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/this-aint-no-disco-fireball-malware-img3.png\" alt=\"\"\/><figcaption class=\"wp-element-caption\"><em>Figure 3 Registry key pointing in the code<\/em><\/figcaption><\/figure>\n\n\n\n<p>We executed these instruction sets and watched for any changes in the system registry traces.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/this-aint-no-disco-fireball-malware-img4.png\" alt=\"\"\/><figcaption class=\"wp-element-caption\"><em>Figure 4 Image File Execution Options<\/em><\/figcaption><\/figure>\n\n\n\n<p>What we\u2019re seeing here is that the image file execution option entry can be used to replace a file with another process using the \u2018debugger\u2019 value. To see how this works, let\u2019s take a process explorer, a similar tool to Windows Task Manager, and view the running processes:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/this-aint-no-disco-fireball-malware-img5.png\" alt=\"\" style=\"width:840px;height:auto\"\/><figcaption class=\"wp-element-caption\"><em>Figure 5 Replacing task manager by process explorer<\/em><\/figcaption><\/figure>\n\n\n\n<p>After doing this, we can see the registry trace changes in the Image file execution option.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/this-aint-no-disco-fireball-malware-img6.png\" alt=\"\"\/><figcaption class=\"wp-element-caption\"><em>Figure 6 Regedit shows process explorer replacing the task manager<\/em><\/figcaption><\/figure>\n\n\n\n<p>This is the process we would undertake to replace task manager manually, and the malware author uses this same technique to replace important files with the \u2018debugger\u2019 value.<br><br>If we now refer back to Figure 4, we can see that MRT.exe is replaced by the Fireball malware \u2013 MRT.exe is Microsoft\u2019s malicious software removal tool.<br><br>Now we\u2019ll move on to our next executable file.<br><br>MD5:&nbsp; 7ADB7F56E81456F3B421C01AB19B1900<br><br>This file doesn\u2019t have any embedded url, but we do see the peculiar registry entry &#8220;HKEY_LOCAL_MACHINE\\SOFTWARE\\ScreenShot&#8221;.<br><br>It is supposed to be a screenshot application but didn\u2019t show any behaviour in our virtual machine, so we proceeded with the other dll files.<br><br>DLL file analysis:<br><br>We started our analysis on the dll (MD5: FAB40A7BDE5250A6BC8644F4D6B9C28F).<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/this-aint-no-disco-fireball-malware-img7.png\" alt=\"\"\/><figcaption class=\"wp-element-caption\"><em>Figure 7 DLL file &#8211; Export details<\/em><\/figcaption><\/figure>\n\n\n\n<p>Interesting strings:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>00000001B36F&nbsp;&nbsp; 00001001C56F&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;0&nbsp;&nbsp; d\\\\.\\PhysicalDrive%d<\/li>\n\n\n\n<li>00000001B3F0&nbsp;&nbsp; 00001001C5F0&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; %u_%u<\/li>\n\n\n\n<li>00000001B404&nbsp;&nbsp; 00001001C604&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; %s_%s<\/li>\n\n\n\n<li>00000001B410&nbsp;&nbsp; 00001001C610&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; %s_%08X<\/li>\n\n\n\n<li>00000001B450&nbsp;&nbsp; 00001001C650&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; cloud<\/li>\n\n\n\n<li>00000001B45C&nbsp;&nbsp; 00001001C65C&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; front<\/li>\n\n\n\n<li>00000001B468 &nbsp;&nbsp;00001001C668&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; .net\/\/v<\/li>\n\n\n\n<li>00000001B480&nbsp;&nbsp; 00001001C680&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; ?action=<\/li>\n\n\n\n<li>00000001B49C&nbsp;&nbsp; 00001001C69C&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; http:\/\/<\/li>\n\n\n\n<li>00000001B4E0&nbsp;&nbsp; 00001001C6E0&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; HTTP\/1.0<\/li>\n\n\n\n<li>00000001B54C&nbsp;&nbsp; 00001001C74C&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; rundll32.exe &#8220;<\/li>\n\n\n\n<li>00000001B368&nbsp;&nbsp; 00001001C568&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0 &nbsp;&nbsp;unnamed<\/li>\n\n\n\n<li>00000001B4AC&nbsp;&nbsp; 00001001C6AC&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; Internet Open Failed!<\/li>\n\n\n\n<li>00000001B4C4&nbsp;&nbsp; 00001001C6C4&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; Internet Connect Failed!<\/li>\n\n\n\n<li>00000001B4FC&nbsp;&nbsp; 00001001C6FC&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; Http Open Failed!<\/li>\n\n\n\n<li>00000001B510&nbsp;&nbsp; 00001001C710&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; Http Send Request Failed!<\/li>\n\n\n\n<li>00000001B5D8&nbsp;&nbsp; 00001001C7D8&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp; C:\\Users\\Administrator\\Desktop\\archer_lyl\\Release\\ Archer_Input.pdb<\/li>\n\n\n\n<li>00000001CAC8&nbsp;&nbsp; 00001001DCC8&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; InternetOpenW<\/li>\n\n\n\n<li>00000001CAD8&nbsp;&nbsp; 00001001DCD8&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; InternetCrackUrlW<\/li>\n\n\n\n<li>00000001CAEC&nbsp;&nbsp; 00001001DCEC&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; InternetReadFile<\/li>\n\n\n\n<li>00000001CB00&nbsp;&nbsp; 00001001DD00&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; InternetConnectW<\/li>\n\n\n\n<li>00000001CB14&nbsp;&nbsp; 00001001DD14&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; HttpSendRequestW<\/li>\n\n\n\n<li>00000001CB28&nbsp;&nbsp; 00001001DD28&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; HttpQueryInfoW<\/li>\n\n\n\n<li>00000001CB3A&nbsp;&nbsp; 00001001DD3A&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; HttpOpenRequestW<\/li>\n\n\n\n<li>00000001CB4E&nbsp;&nbsp; 00001001DD4E&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 0&nbsp;&nbsp; InternetCloseHandle<\/li>\n<\/ul>\n\n\n\n<p>We registered the DLL to find any behaviour changes in the system. It creates a new registry entry in the StartMenu2 program.<br><br>We checked the next DLL file (MD5: 8C61A6937963507DC87D8BF00385C0BC) to find whether this file also had any similar behaviour.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/lmntrix.com\/blog\/wp-content\/uploads\/2024\/08\/this-aint-no-disco-fireball-malware-img8.png\" alt=\"\"\/><figcaption class=\"wp-element-caption\"><em>Figure 8 File export details<\/em><\/figcaption><\/figure>\n\n\n\n<p>Interesting strings inside this file:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>strings [C:\\ProgramData]<\/li>\n\n\n\n<li>strings [msmpeng]<\/li>\n\n\n\n<li>strings [C:\\Windows\\System32\\cmd.exe \/c &#8220;&#8221;]<\/li>\n\n\n\n<li>strings [C:\\Windows\\System32\\cmd.exe \/c &#8220;]<\/li>\n\n\n\n<li>strings [ -l &gt;&gt; ]<\/li>\n\n\n\n<li>strings [ttttt.exe]<\/li>\n\n\n\n<li>strings [Microsoft\\Windows Defender\\Support]<\/li>\n\n\n\n<li>strings [hhhhh.exe]<\/li>\n\n\n\n<li>strings [kernel32]<\/li>\n\n\n\n<li>strings [Microsoft\\Microsoft Antimalware\\Support]<\/li>\n\n\n\n<li>strings [d\\\\.\\PhysicalDrive%d]<\/li>\n\n\n\n<li>strings [\\\\.\\Scsi%d:]<\/li>\n\n\n\n<li>strings [MachineGuid]<\/li>\n\n\n\n<li>strings [SOFTWARE\\Microsoft\\Cryptography]<\/li>\n\n\n\n<li>strings [%s_%08X]<\/li>\n\n\n\n<li>strings [inqmqq]<\/li>\n\n\n\n<li>strings [.cloud]<\/li>\n\n\n\n<li>strings [front.net]<\/li>\n\n\n\n<li>strings [?action=]<\/li>\n\n\n\n<li>strings [clean\/]<\/li>\n\n\n\n<li>strings [http:\/\/]<\/li>\n\n\n\n<li>strings [HTTP\/1.0]<\/li>\n\n\n\n<li>strings [list.dat]<\/li>\n\n\n\n<li>strings [ -stop &#8220;]<\/li>\n\n\n\n<li>strings [msmpeng]<\/li>\n\n\n\n<li>strings [&#8220;,StartClear2]<\/li>\n\n\n\n<li>strings [C:\\Windows\\System32\\Rundll32.exe &#8220;]<\/li>\n\n\n\n<li>strings [cle.log.4]<\/li>\n\n\n\n<li>strings [cle.log.3]<\/li>\n\n\n\n<li>strings [cle.log.2]<\/li>\n\n\n\n<li>strings [cle.log.1]<\/li>\n\n\n\n<li>strings [ -accepteula]<\/li>\n\n\n\n<li>strings [hhhhh.exe]<\/li>\n\n\n\n<li>strings [ttttt.exe]<\/li>\n<\/ul>\n\n\n\n<p>We then moved to the final file (MD5: B56D1D35D46630335E03AF9ADD84B488), which contains the following export function:<br><br>&nbsp; &nbsp; Export table of DLL &#8216;WinSAP.dll&#8217;:<br><br>Base ordinal number: 00000001h \/ 1<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>2 names are exported<\/li>\n\n\n\n<li>2 functions are exported<\/li>\n<\/ul>\n\n\n\n<p>Ordinal Offset&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;Name<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>00002F80h &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; MAIN<\/li>\n\n\n\n<li>0000B990h &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;ServiceMain<\/li>\n<\/ul>\n\n\n\n<p>We found the following strings in this file:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>strings [\\\\.\\PhysicalDrive%d]<\/li>\n\n\n\n<li>strings [\\\\.\\Scsi%d:]<\/li>\n\n\n\n<li>strings [SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Svchost]<\/li>\n\n\n\n<li>strings [NOT UPDATE]<\/li>\n\n\n\n<li>strings [UPDATE OVERWRITE]<\/li>\n\n\n\n<li>strings [SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion\\Svchost]<\/li>\n\n\n\n<li>strings [%s\\svchost.exe -k %s]<\/li>\n\n\n\n<li>strings [%s\\svchost.exe -k %s]<\/li>\n\n\n\n<li>strings [Advapi32]<\/li>\n\n\n\n<li>strings [SYSTEM\\CurrentControlSet\\Services\\%s]<\/li>\n\n\n\n<li>strings [Parameters]<\/li>\n\n\n\n<li>strings [ServiceDll]<\/li>\n\n\n\n<li>strings [explorer.exe]<\/li>\n\n\n\n<li>strings [SeDebugPrivilege]<\/li>\n\n\n\n<li>strings [ADFWAGAADF_Example\/1.0]<\/li>\n\n\n\n<li>strings [2.7.38]<\/li>\n\n\n\n<li>strings [2.7.38]<\/li>\n\n\n\n<li>strings [explorer.exe]<\/li>\n\n\n\n<li>strings [winsap]<\/li>\n\n\n\n<li>strings [\\SETUP.dll]<\/li>\n\n\n\n<li>strings [winsap]<\/li>\n\n\n\n<li>Strings [Copyright (c) 1992-2004 by P.J. Plauger, licensed by Dinkumware, Ltd. ALL RIGHTS RESERVED.]<\/li>\n\n\n\n<li>strings [SCSIDISK]<\/li>\n\n\n\n<li>strings [CreateServiceW]<\/li>\n\n\n\n<li>strings [StartServiceW]<\/li>\n\n\n\n<li>strings [-install]<\/li>\n\n\n\n<li>strings [-update]<\/li>\n\n\n\n<li>strings [-install]<\/li>\n\n\n\n<li>strings [-uninstall]<\/li>\n\n\n\n<li>strings [-update]<\/li>\n\n\n\n<li>strings [aHR0cDovL2QzaTFhc29zd3VmcDVrLmNsb3VkZnJvbnQubmV0L3Y0L2d0Zy8lcz9hY3Rpb249dmlzaXQud2luc2FwLndvcmsmdXBkYXRlMz12ZXJzaW9uLCVz]<\/li>\n\n\n\n<li>strings [aHR0cDovL2QzaTFhc29zd3VmcDVrLmNsb3VkZnJvbnQubmV0L3Y0L2d0Zy8lcz9hY3Rpb249dmlzaXQud2luc2FwLmluc3RhbGw=]<\/li>\n\n\n\n<li>strings [aHR0cDovL2QzaTFhc29zd3VmcDVrLmNsb3VkZnJvbnQubmV0L3Y0L2d0Zy8lcz9hY3Rpb249dmlzaXQud2luc2FwLnVwZGF0ZW9r]<\/li>\n\n\n\n<li>strings [aHR0cDovL2QzaTFhc29zd3VmcDVrLmNsb3VkZnJvbnQubmV0L3Y0L2d0Zy8lcz9hY3Rpb249dmlzaXQud2luc2FwLnN0YXJ0aW5zdGFsbA==]<\/li>\n\n\n\n<li>strings [aHR0cDovL2QzaTFhc29zd3VmcDVrLmNsb3VkZnJvbnQubmV0L3Y0L2d0Zy8lcz9hY3Rpb249dmlzaXQud2luc2FwLnN0YXJ0dXBkYXRl]<\/li>\n\n\n\n<li>strings [aHR0cDovL2QzaTFhc29zd3VmcDVrLmNsb3VkZnJvbnQubmV0L3Y0L2d0Zy8lcz9hY3Rpb249dmlzaXQud2luc2FwLmlzZXhpc3RlZA==]<\/li>\n\n\n\n<li>strings [aHR0cDovL2RjNDRxandhbDNwMDcuY2xvdWRmcm9udC5uZXQvd2luc2FwL3VwP3B0aWQ9JXMmc2lkPSVzJmxuPSVzXyVzJnZlcj0lcyZ1aWQ9JXMmZHA9MA==]<\/li>\n<\/ul>\n\n\n\n<p>This is the interesting part in this file, some strings appeared to be encoded:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>aHR0cDovL2QzaTFhc29zd3VmcDVrLmNsb3VkZnJvbnQubmV0L3Y0L2d0Zy8lcz9hY3Rpb249dmlzaXQud2luc2FwLndvcmsmdXBkYXRlMz12ZXJzaW9uLCVz<\/li>\n\n\n\n<li>aHR0cDovL2QzaTFhc29zd3VmcDVrLmNsb3VkZnJvbnQubmV0L3Y0L2d0Zy8lcz9hY3Rpb249dmlzaXQud2luc2FwLmluc3RhbGw=<\/li>\n\n\n\n<li>aHR0cDovL2QzaTFhc29zd3VmcDVrLmNsb3VkZnJvbnQubmV0L3Y0L2d0Zy8lcz9hY3Rpb249dmlzaXQud2luc2FwLnVwZGF0ZW9r<\/li>\n\n\n\n<li>aHR0cDovL2QzaTFhc29zd3VmcDVrLmNsb3VkZnJvbnQubmV0L3Y0L2d0Zy8lcz9hY3Rpb249dmlzaXQud2luc2FwLnN0YXJ0aW5zdGFsbA==<\/li>\n\n\n\n<li>aHR0cDovL2QzaTFhc29zd3VmcDVrLmNsb3VkZnJvbnQubmV0L3Y0L2d0Zy8lcz9hY3Rpb249dmlzaXQud2luc2FwLnN0YXJ0dXBkYXRl<\/li>\n\n\n\n<li>aHR0cDovL2QzaTFhc29zd3VmcDVrLmNsb3VkZnJvbnQubmV0L3Y0L2d0Zy8lcz9hY3Rpb249dmlzaXQud2luc2FwLmlzZXhpc3RlZA==<\/li>\n\n\n\n<li>aHR0cDovL2RjNDRxandhbDNwMDcuY2xvdWRmcm9udC5uZXQvd2luc2FwL3VwP3B0aWQ9JXMmc2lkPSVzJmxuPSVzXyVzJnZlcj0lcyZ1aWQ9JXMmZHA9MA==<\/li>\n<\/ul>\n\n\n\n<p>Here are the same values decoded:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>hxxp:\/\/d3i1asoswufp5k(.)cloudfront(.)net\/v4\/gtg\/%s?action=visit.winsap.work&amp;update3=version,%s<\/li>\n\n\n\n<li>hxxp:\/\/d3i1asoswufp5k (.)cloudfront (.)net\/v4\/gtg\/%s?action=visit.winsap.install<\/li>\n\n\n\n<li>hxxp:\/\/d3i1asoswufp5k (.)cloudfront (.)net\/v4\/gtg\/%s?action=visit.winsap.updateok<\/li>\n\n\n\n<li>hxxp:\/\/d3i1asoswufp5k (.)cloudfront (.)net\/v4\/gtg\/%s?action=visit.winsap.startupdate<\/li>\n\n\n\n<li>hxxp:\/\/d3i1asoswufp5k (.)cloudfront (.)net\/v4\/gtg\/%s?action=visit.winsap.isexisted<\/li>\n\n\n\n<li>hxxp:\/\/dc44qjwal3p07 (.)cloudfront (.)net\/winsap\/up?ptid=%s&amp;sid=%s&amp;ln=%s_%s&amp;ver=%s&amp;uid=%s&amp;dp=0<\/li>\n<\/ul>\n\n\n\n<p>All these are malicious URLs present in the file. We advise readers to block these urls in their firewall and if you notice any strange behaviour from your web browser, please revert the web browser settings back to default and remove any extensions you did not install.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new strain of Chinese malware, dubbed Fireball by researchers, has recently been discovered on more than 250 million computers around the globe. Indian machines are the most heavily infected (10 per cent), followed by Brazil, Mexico and Indonesia (Nine, six and five per cent respectively). Once installed, Fireball hijacks internet browsers, effectively turning them into zombies. Currently, the malware\u2019s aim is to install plugins and other configurations to enhance ad performance and manipulating traffic in order to increase advertising revenue.<\/p>\n","protected":false},"author":1,"featured_media":1083,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21],"tags":[],"class_list":["post-1071","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-labs"],"_links":{"self":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1071","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/comments?post=1071"}],"version-history":[{"count":5,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1071\/revisions"}],"predecessor-version":[{"id":4093,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/posts\/1071\/revisions\/4093"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media\/1083"}],"wp:attachment":[{"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/media?parent=1071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/categories?post=1071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lmntrix.com\/blog\/wp-json\/wp\/v2\/tags?post=1071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}