Chromeloader - a Pushy Malvertiser
Incident Report for Ascend Security Events
Resolved
Chromeloader - a Pushy Malvertiser

Source: Red Canary

ChromeLoader is a pervasive and persistent browser hijacker that modifies its victims’ browser settings and redirects user traffic to advertisement websites. This malware is introduced via an ISO file that baits users into executing it by posing as a cracked video game, pirated movie, or TV show. It eventually manifests as a browser extension. ChromeLoader has seen a vast increase in detections over the past couple weeks.

Like most suspicious browser extensions, ChromeLoader is a relatively benign threat that hijacks user search queries and redirects traffic to an advertising site. However, ChromeLoader uses PowerShell to inject itself into the browser and add a malicious extension to it, a technique not seen very often. This introduces the opportunity to go undetected before performing more overtly malicious activity, like exfiltrating data from a user’s browser sessions.

A MacOS version of the ChromeLoader malware was discovered in late April which is capable of loading malicious extensions into both the Chrome and Safari web browsers. The macOS variation has the same initial access technique as the Windows variant, namely that it uses baited social media posts with QR codes or links that direct users to malicious pay-per-install download sites. Instead of originating as an ISO, the macOS variation originates in an Apple Disk Image (DMG) file format. And unlike the Windows variation, the DMG file contains an installer script that drops payloads for either Chrome or Safari, not a portable executable file.

Indicators of Compromise:

• 18b8ab327177cbde47867694d3d7acb93c83237d2418271f1020fe943760c026
• 23f30fa4e9fe3580898be54f8762f85d5098fd526a51183c457b44822446c25a
• 276f4008ce6dcf867f3325c6b002950cbd0fdb5bf12dc3d3afb1374622820a4e
• 309c87b34966daecd05c48b787c3094eeed85b5f23ec93b20fc9cdbf8ff9b586
• 47c65ef4d6b0ffe7109c588e04575dcf05fdf3afe5796078b4f335cb94c438b7
• 502a8d1e95c21b5dc283ef4877ca2fe2ba41570bd813c47527fca2fb224d5380
• 5e6b5a9c0849db8ca0696a16c882d6945a62e419bd646f23d4d00533bbe9bca5
• 6e0cb7518874437bac717ba1888991cee48dfaca4c80a4cbbbe013a5fe7b01a6
• 83cf9d2244fa1fa2a35aee07093419ecc4c484bb398482eec061bcbfbf1f7fea
• 87f0416410ac5da6fd865c3398c3d9012e5488583b39edacd37f89bc9469d6a9
• c6a68fac895c0b15d5cbbba63f208e5b0a6f3c1d2382b9465375d1794f447ac5
• c7aedc8895e0b306c3a287995e071d7ff2aa09b6dac42b1f8e23a8f93eee8c7a
• d374ef30aa17f8bad0fb88d0da47f4038669c340d4c7fc2ff6505b07c17fdf65
• dfc90f64139b050cf3c72d833e1a7915af1bd689ece7222b9ac2c8426a0bfd0a
• 9a5be852afef127b5cbe3af23ef49055677b07bcaca1735cf4ad0ff1e8295ccb
• 6b1db4f891aa9033b615978a3fcfef02f1904f4eba984ba756ff5cd755d6f0b4
• 2d4454d610ae48bf9ffbb7bafcf80140a286898a7ffda39113da1820575a892f
• 8840f385340fad9dd452e243ad1a57fb44acfd6764d4bce98a936e14a7d0bfa6
• 2e958f481828ce7c59a3beab2ddac5561347e6f9bc25e6716c4524b845e83938
• 1c0254f0f811aadd6f1dad1cc5926f6b32fa2fb0866c35bf6a9f3dfad25fd9ca

As a result, Ascend Technologies has pushed the detection ability of the known IOCs across our EDR, SIEM, and anti-malware platforms. These IOCs include IPs and hash values which will give us the ability to detect and alert. As is the case with most malware, end users are targeted which makes maintaining a robust security posture highly important, including end-user training, to develop safe and secure internet browsing habits.

Author: Evan Obal

Source: https://redcanary.com/blog/chromeloader/
Posted May 26, 2022 - 11:43 CDT