Threat Advisory

TA585 APT Delivers MonsterV2 Malware via ClickFix and Web Injections

Threat: Malicious Campaign
Threat Actor Name: TA585
Targeted Region: Global
Targeted Sector: Technology & IT, Finance & Banking
Criticality: High

 

EXECUTIVE SUMMARY:

A newly observed threat actor, referred to as TA585, is emerging as a self-sufficient operation. Unlike many malicious groups that outsource portions of their attack chain, TA585 orchestrates its own infrastructure, delivery mechanisms, and malware deployment. Its favored payload, MonsterV2, possesses a wide range of intrusive capabilities and is utilized by multiple groups in parallel.

TA585 conducts its operations using compromised websites, injecting malicious JavaScript into legitimate pages to deliver payloads selectively to visitors. Its injection scheme frequently relies on a technique known as ClickFix, wherein users are tricked into executing commands under the guise of human verification. In some campaigns, the attacker also leverages GitHub-style notifications to bait victims toward malicious URLs. Once delivered, MonsterV2 is decrypted, configured, and executed. It requests system privileges and may deploy a unique mutex for process identification. Configuration data is encrypted via ChaCha20, compressed using zlib, and parsed in memory. MonsterV2 supports a wide set of features: credential theft, clipboard manipulation, hidden VNC remote control, arbitrary command execution, file operations, and payload download functionality all under commands issued by a command-and-control (C2) server. The malware also appears to exclude systems in certain countries. In many instances, the payload is wrapped or packed via a crypter, which implements anti-analysis techniques such as junk code, BIOS checks, and sandbox evasion before decrypting and deploying the core malware.

TA585 represents a notably threat actor that consolidates many parts of a typical attack chain from infrastructure creation to delivery to payload execution under its direct control. Its use of MonsterV2, a feature-rich malware adopted across multiple threat actors, underscores its flexibility and reach. It should remain vigilant for indicators associated with this campaign and adopt mitigations such as disabling non-privileged PowerShell execution, educating users about deceptive CAPTCHA techniques, and employing robust detection of through compromised web injects and filtering behavior.

 

THREAT PROFILE:

Tactic Technique Id Technique Sub-technique
Initial Access T1566.002 Phishing Spearphishing Link
Execution T1059.001 Command and Scripting Interpreter PowerShell
T1204.002 User Execution Malicious File
Defense Evasion T1562.001 Impair Defenses Disable or Modify Tools
Discovery T1083 File and Directory Discovery
Collection T1125 Video Capture
T1005 Data from Local System
Command and Control T1095 Non-Application Layer Protocol
Exfiltration T1041 Exfiltration Over C2 Channel

 

REFERENCES:

The following reports contain further technical details:

crossmenu