Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Dissecting CrashFix: A New Toy

0
Medium
Published: Sat Jan 17 2026 (01/17/2026, 13:17:09 UTC)
Source: AlienVault OTX General

Description

KongTuke, a threat actor active since 2025, has launched a campaign using a malicious browser extension named NexShield that impersonates uBlock Origin Lite. This extension causes browsers to crash and displays fake security warnings to trick users into executing malicious commands. Both home and corporate users are targeted, with domain-joined machines receiving a more advanced Python-based RAT called ModeloRAT. The attack chain uses multiple layers of obfuscation, anti-analysis techniques, and a Domain Generation Algorithm (DGA) for command and control communication. Extensive fingerprinting is employed to evade detection in analysis environments. The campaign focuses on infiltrating enterprise networks to enable lateral movement and data exfiltration. No CVE or known exploits in the wild are reported yet, but the threat demonstrates medium severity due to its complexity and targeting of enterprise environments.

AI-Powered Analysis

AILast updated: 01/19/2026, 09:42:13 UTC

Technical Analysis

The threat actor KongTuke has initiated a sophisticated malware campaign leveraging a malicious browser extension dubbed NexShield, which masquerades as the legitimate uBlock Origin Lite extension. Upon installation, NexShield induces browser crashes and presents deceptive security alerts designed to manipulate users into executing harmful commands, effectively leveraging social engineering. The campaign targets both individual home users and corporate environments; however, domain-joined corporate machines are subjected to a more advanced payload—a Python-based Remote Access Trojan (RAT) named ModeloRAT. This RAT facilitates persistent access, lateral movement within networks, and potential data exfiltration. The attack employs multiple evasion techniques including layered obfuscation, anti-analysis mechanisms to detect sandbox or virtualized environments, and a Domain Generation Algorithm (DGA) to dynamically generate command and control (C2) domains, complicating detection and takedown efforts. Extensive fingerprinting is used to identify analysis environments and avoid execution therein, enhancing stealth. Indicators of compromise include specific file hashes, IP addresses, URLs, and domains associated with the campaign. Although no CVE identifiers or known exploits in the wild are documented, the campaign's multi-stage, targeted approach and use of advanced malware components indicate a medium-level threat with potential for significant impact, especially within enterprise networks.

Potential Impact

For European organizations, this threat poses a considerable risk primarily to enterprises with domain-joined Windows environments, as the ModeloRAT enables attackers to maintain persistent access, conduct lateral movement, and exfiltrate sensitive data. The social engineering component targeting browser users increases the likelihood of initial infection across both home and corporate users, potentially serving as an entry vector into corporate networks. Browser crashes and fake security warnings can disrupt user productivity and may lead to inadvertent execution of malicious commands, escalating the compromise. The use of obfuscation, anti-analysis, and DGA complicates detection and response efforts, potentially allowing prolonged undetected presence. Data confidentiality, integrity, and availability could be compromised, especially if attackers leverage ModeloRAT to escalate privileges or deploy additional payloads. The campaign's focus on enterprise infiltration suggests a strategic intent to target valuable assets, intellectual property, or personal data, which could lead to regulatory and reputational consequences under GDPR and other European data protection laws.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy tailored to this threat. First, enforce strict controls on browser extension installations by whitelisting approved extensions and blocking untrusted or unknown ones, especially those impersonating popular tools like uBlock Origin Lite. Deploy endpoint detection and response (EDR) solutions capable of detecting obfuscated scripts, Python-based RATs, and suspicious network behaviors such as DGA-generated domain communications. Enhance user awareness training focusing on recognizing fake security warnings and social engineering tactics used in browser contexts. Monitor network traffic for connections to known malicious domains and IPs associated with this campaign (e.g., nexsnield.com, fyvw2oiv.top). Implement robust domain join and Active Directory monitoring to detect anomalous activities indicative of lateral movement. Employ sandboxing and behavioral analysis tools that can bypass anti-analysis techniques to identify malicious payloads. Regularly update and patch browsers and security software to reduce exploitation vectors. Finally, establish incident response playbooks specifically addressing malicious browser extensions and RAT infections to ensure rapid containment and remediation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.huntress.com/blog/malicious-browser-extention-crashfix-kongtuke"]
Adversary
KongTuke
Pulse Id
696b8bd510774c3939103737
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash54725bf9a7809ef480fc5e35a7521137
hash6aa1e36457d6dbc09ff7dd218c7c223b
hash71164efdc4d7e816b385551b38ada5ca
hash902c133812718bacf8e86a6d8bbeb22d
hashcb9c57145f4b6afbc08f24a19257ed5a
hash23ae2fdaf0c85b08e13ef68d925997c08a19a1f9
hash2c9baaf2105dc7f730c6d562472780bd5535c32d
hash5e186b23d4eecd7b3b99f8b88178545ade747cd8
hashd0a0e04504fa0e1e91850be141c9bb23608b73d7
hashe1be0cc7b7e58e4205920c019d786db636036a4c
hash138d2a62b73e89fc4d09416bcefed27e139ae90016ba4493efc5fbf43b66acfa
hash6399c686eba09584bbbb02f31d398ace333a2b57529059849ef97ce7c27752f4
hashc15f44d6abb3a2a882ffdc9b90f7bb5d1a233c0aa183eb765aa8bfba5832c8c6
hashc46af9ae6ab0e7567573dbc950a8ffbe30ea848fac90cd15860045fe7640199c
hashfbfce492d1aa458c0ccc8ce4611f0e2d00913c8d51b5016ce60a7f59db67de67

Ip

ValueDescriptionCopy
ip170.168.103.208
ip199.217.98.108

Url

ValueDescriptionCopy
urlhttp://fyvw2oiv.top/1.php?s=63e95be1-92e0-45c1-a928-65d63b17cd1c
urlhttps://nexsnield.com/install?uuid=550e8400-e29b-41d4-a716-446655440000&version=2025.1116.1842
urlhttps://nexsnield.com/update?uuid=550e8400-e29b-41d4-a716-446655440000&version=2025.1116.1842&previous=2025.1115.1000

Domain

ValueDescriptionCopy
domainfyvw2oiv.top
domainnexsnield.com

Threat ID: 696df8d5d302b072d9948582

Added to database: 1/19/2026, 9:26:45 AM

Last enriched: 1/19/2026, 9:42:13 AM

Last updated: 1/19/2026, 11:38:29 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats