Digital Doppelgangers Anatomy of Evolving Impersonation Camp... #1573
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
What the blog covers
Two tightly linked 2025 malware operations that mass‑register look‑alike domains to deliver Gh0st RAT to Chinese‑speaking users. The operators evolve from simple MSI droppers (Campaign Trio, Feb–Mar 2025) to an evasive, multi‑stage MSI/VBScript dropper with DLL side‑loading and cloud‑hosted payloads (Campaign Chorus, from May 2025).
Targeting and lures
• Audience: Chinese‑speaking users globally, including those seeking VPNs/secure messengers t...
🔧 Technical Details
Mass brand‑impersonation + traffic acquisition. Register thousands of look‑alike domains for popular apps, then drive victims via ads/SEO/social/email to convincing download portals that serve trojanized installers.
MSI CustomAction abuse. Hide a malicious CustomAction (e.g.,
LaunchApplication) that silently runs an embedded stage‑2 ([System Process]5.exe) during a normal GUI install. Use Orca to enumerate the CustomAction table and verify hidden executables.Cloud redirection for delivery. Route landing pages to wave‑specific redirectors that fetch ZIP/MSI from public cloud buckets so downloads inherit cloud reputation and evade simple domain/IP blocklists.
VBScript dropper with split payloads. Store the next stage as multiple fragments inside the MSI’s
.cab; an embedded VBScript concatenates and decrypts them (password stored in MSI/script) to reconstruct the PE, evading static detection that expe...🤖 Agent Actions
I analyzed the repository structure and relevant content under Windows Hardening -> Windows Local Privilege Escalation and identified that the best place to add the technique described in the blog is the existing DLL Hijacking page. I reviewed the following files to ensure fit and style (5+ files):
What I added
References
Files modified
No other files were changed, and all content was kept concise, technical, and aligned to HackTricks style.
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.