SmartApeSG By Jonathan Mccay Published: 2023-10-26 · Archived: 2026-05-05 02:06:10 UTC 3 min read Oct 26, 2023 By: Jonathan McCay SmartApeSG, (ZPHP, HANEYMANEY) is a threat actor using fake browser updates to distribute Netsupport RAT. Largely confused with SocGholish, this group uses a similar looking infection chain and fake update lure. When Trellix¹ first reported the earlier techniques used by this group, the activity was unattributed. After researchers noticed this threat actor continually uses SmartApe ASN to host their infrastructure, and delivers malicious javascript through fake browser updates like SocGholish, the name SmartApeSG was given. Site Inject: Injected into a compromised site is a script tag used to call the first script from the Threat Actor’s infrastructure. Compromised Site Inject Minlen.php: Minlen.php is responsible for browser validation and payload delivery. If the host was sent to this site from an acceptable referrer, and is using the correct browser, (Firefox, Chrome, or Edge) a javascript payload will be returned. Javascript Payload — (delivered by Minlen.php) The javascript payload delivered by minlen.php is used to construct the iframe needed to display the fake update lure. Minlen.php will also reach out to another script on the same server, (qzwewmrqqqqnaww.php) to retreive the html displayed in the iframe. Old javascript paylaod An older sample of the javascript payload delivered by minlen.php shows an iframe being built to display code returned by zwewmrqqqqnaww.php. https://medium.com/walmartglobaltech/smartapesg-4605157a5b80 Page 1 of 6 Older javascript payload Updated javascript payload The latest version of this script has an additional layer of obfuscation added but, appears to perform the same function Press enter or click to view image in full size Obfuscated javascript payload qzwewmrqqqqnaww.php — Retrieve HTML: Returns the html for the lure which includes the javascript “update.zip” encoded in base64. Press enter or click to view image in full size Base64 encoded .zip Chrome Lure (Fake Update): Press enter or click to view image in full size https://medium.com/walmartglobaltech/smartapesg-4605157a5b80 Page 2 of 6 SmartApeSG — Fake Update Javascript — “Update”: Get Jonathan Mccay’s stories in your inbox Join Medium for free to get updates from this writer. Remember me for faster sign in If the user clicks the “Update Chrome” button, a .zip containing javascript will be base64 decoded and downloaded to the host. Extracted .zip Update_browser_10.6336.js If the Javascript is executed, another script, (help.php) will be contacted to retrieve and execute an additional Powershell cmd. help.php The Powershell returned by help.php will create a run key in HKCU to setup persistence, contact another script, (111.php) to download and decode the Netsupport binaries, and execute. Press enter or click to view image in full size https://medium.com/walmartglobaltech/smartapesg-4605157a5b80 Page 3 of 6 Powershell — Download & Execute 111.php Returns a base64 encoded .zip file of the Netsupport binaries. After the encoded binary is returned, the Powershell command will complete the infection. Netsupport: Netsupport — Client32.ini URI & Script Names /cdn-js/wds.min.php /cdn-js/wds-main.php /cdn/zwmrqqgqnaww.php /cdn/qzwewmrqqgqnaww.php /cdn/zwewmrqqgqnaww.php /cdn-js/minlen.php /cdn-vs/minlen.php /cdn/help.php /cdn/91c818ee6e9ec29f8c1.php /cdn/xxx.php /cdn/www.php /assets/js/css.js /cgi-bin.js HKCU — Run Key DIVX DIVXX SmartApeSG: https://medium.com/walmartglobaltech/smartapesg-4605157a5b80 Page 4 of 6 cdespto[.]org seyishalom[.]com baroksmig[.]online cheetahsnv[.]com clubcamporico[.]com altiordp[.]com bigbirdmarketing[.]com ponraj[.]com magydostravel[.]com itsdigitalshiva[.]com cristinaamaro[.]com ccescpolace[.]com kororo[.]com fablane[.]com amazonascash[.]com residencialcasabrasileira[.]com profille-cex-io[.]com nilselsholz[.]com credit-volta[.]com aflomusic[.]com webull[.]art zahrajoulaei[.]tech domaintestss[.]xyz pixelbase[.]com krafttopia[.]net voluntarismo[.]com kalista-posh[.]com polyfieldgallery[.]com seosuccesslab[.]com offshorechain[.]org lucyflix[.]com mypersonalprojectdomain[.]com marcborowy[.]com faseries[.]com manxheu[.]online lintingdaun[.]com invertirenmercados[.]com impulsehorizon[.]com datavortexllc[.]com manchhd32ss[.]fun tidaysdeals[.]online mangoairsoft[.]com kevinsmithson[.]com xxxmir[.]info phimnhanh[.]info configuratorpro[.]com https://medium.com/walmartglobaltech/smartapesg-4605157a5b80 Page 5 of 6 eastrenclouds[.]com antiqueglossary[.]com boka-rem[.]com mansaentertainment[.]com loloalexander[.]com gnavigatio[.]com arauas[.]com gamefllix[.]com SmartApeSG — Netsupport: 94.158.244[.]118 94.158.247[.]23 185.163.46[.]93 5.252.178[.]48 5.252.177[.]214 5.252.177[.]126 sdjfnvnbbz[.]pw References 1: https://www.trellix.com/about/newsroom/stories/research/new-techniques-of-fake-browser-updates/ Source: https://medium.com/walmartglobaltech/smartapesg-4605157a5b80 https://medium.com/walmartglobaltech/smartapesg-4605157a5b80 Page 6 of 6