Skip to main content

New malware campaign discovered via ManualFinder

Medium
Published: Wed Sep 03 2025 (09/03/2025, 20:12:08 UTC)
Source: AlienVault OTX General

Description

A global malware infection of Windows computers has been uncovered, stemming from software users installed themselves. The malware, disguised as legitimate PDF editors and manual finders, turns infected systems into residential proxies for malicious actors. The infection chain starts with deceptive ads posing as PDF manuals. The campaign, which appears to have ceased, was widespread due to large-scale advertising. The malware creates scheduled tasks, executes JavaScript files, and communicates with various C2 domains. It's potentially linked to the OneStart Browser, known for spreading spyware and adware. Authorities advise blocking access to related domains, checking for specific applications, and removing software signed by certain certificate issuers.

AI-Powered Analysis

AILast updated: 09/03/2025, 20:33:25 UTC

Technical Analysis

A recent malware campaign targeting Windows systems has been uncovered, involving malicious software disguised as legitimate PDF editors and manual finder tools. The infection vector primarily involved deceptive online advertisements that tricked users into downloading and installing these fake applications under the guise of accessing PDF manuals. Once installed, the malware establishes persistence by creating scheduled tasks and executing JavaScript files to maintain control over the infected system. It communicates with multiple command and control (C2) domains to receive instructions and potentially exfiltrate data. A notable aspect of this campaign is that infected machines are repurposed as residential proxies, allowing threat actors to route malicious traffic through these compromised endpoints, thereby masking their activities and complicating attribution. The campaign is potentially linked to the OneStart Browser, a known distributor of spyware and adware, suggesting a broader ecosystem of unwanted software distribution. The malware employs various techniques consistent with MITRE ATT&CK tactics such as scheduled task creation (T1053.005), script execution (T1059.007), masquerading (T1036.005), user execution (T1204.002), code signing abuse (T1553.002), signed binary proxy execution (T1218.007), persistence mechanisms (T1547.001), data staging (T1102.002), obfuscated files or information (T1027.002), and command and control communication (T1071.001). Although the campaign appears to have ceased, its widespread nature was facilitated by large-scale advertising campaigns, increasing the infection footprint globally. Authorities recommend blocking access to associated domains, auditing systems for suspicious applications, and removing software signed by specific certificate issuers linked to the malware distribution chain.

Potential Impact

For European organizations, this malware campaign poses several risks. The transformation of infected systems into residential proxies can facilitate further malicious activities such as anonymizing cyberattacks, distributing spam, or conducting fraudulent transactions, indirectly implicating the victim organizations in illicit activities. The presence of spyware and adware components can lead to data leakage, privacy violations, and potential intellectual property theft. Scheduled tasks and persistent JavaScript execution increase the difficulty of detection and removal, potentially allowing long-term unauthorized access. The abuse of legitimate-looking software and code signing certificates undermines trust in software supply chains, complicating endpoint security efforts. Given the campaign’s use of deceptive advertising, employees in organizations with less mature cybersecurity awareness programs may be more susceptible to infection. Additionally, the malware’s network communications could lead to bandwidth consumption and network performance degradation. The indirect reputational damage and potential regulatory implications under GDPR for data breaches or unauthorized data processing further elevate the threat to European entities.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy tailored to this threat. First, enhance endpoint detection capabilities to identify and block installation of unauthorized PDF editors or manual finder applications, especially those not sourced from verified vendors. Deploy application whitelisting to prevent execution of unapproved software and scheduled tasks. Network defenses should include blocking known malicious C2 domains and monitoring for unusual outbound traffic patterns indicative of proxy activity. Conduct regular audits of installed software and digital certificates to identify and remove applications signed by suspicious or untrusted certificate authorities. User awareness training should emphasize the risks of downloading software from unverified sources and recognizing deceptive advertisements. Employ advanced threat hunting techniques to detect persistence mechanisms such as scheduled tasks and obfuscated JavaScript files. Integrate threat intelligence feeds referencing this campaign to stay updated on emerging indicators of compromise. Finally, consider implementing network segmentation to limit lateral movement and isolate potentially infected systems.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.ncsc.nl/actueel/nieuws/2025/08/29/nieuwe-malwarecampagne-ontdekt-via-manualfinder"]
Adversary
null
Pulse Id
68b8a1182ec5c19a3c05af6f
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash192b80bab47bce9b96f683409db2fe61
hash213eca72f00563fa2ed788a1212c67e0
hash56fff546ce738e76884611ca49c5751c
hash62e43638548bbe4909eaf8408d8b5686
hash6b5e479394633f4af9957df1d847c665
hash6fd6c053f8fcf345efaa04f16ac0bffe
hasha5d7966e70b62f95ec2e3d18f5f8ab2a
hashb87167c7e4d8c0b180fc6a6a6643069c
hash1b77beedb0b99bf5430c1a18315302399d07812c
hash1eb5be9e5662811fa1412287fa8e5a2d88d0a4d2
hash21df00ac8bf8baa1111f3fc564d27a9eabf0f097
hash2ecd25269173890e04fe00ea23a585e4f0a206ad
hash99201eee9807d24851026a8e8884e4c40245fac7
hasha2278eb6a438dc528f3ebfeb238028c474401bef
hashc60c964e4e0d40e5d038950d75db60b84d4cd911
hashd249a92c9594c0410570a01abe2fce4cd16f762d
hashe0db7b5eaf92feff220c805b0e5f3d8916e18d51
hashf734dc5fb78cf67e63eae2830e656a70c015db15
hash372d89d7dd45b2120f45705a4aa331dfff813a4be642971422e470eb725c4646
hash46c9f63648d1a0fab977ec7b921ee1111a85402591984b12bd41391ecb2f5d6e
hash6bf2cc4e9d9901541214d7efc8bb8bb24ef5bddc238598333c843e421c042c6b
hash71edb9f9f757616fe62a49f2d5b55441f91618904517337abd9d0725b07c2a51
hashcb15e1ec1a472631c53378d54f2043ba57586e3a28329c9dbf40cb69d7c10d2c
hashd9f9584f4f071be9c5cf418cae91423c51d53ecf9924ed39b42028d1314a2edc
hashda3c6ec20a006ec4b289a90488f824f0f72098a2f5c2d3f37d7a2d4a83b344a0
hashe95de8452d32b439e0286868ed16f63943af3bc059dca6bcb48d1cbe2431440e
hashed797beb927738d68378cd718ea0dc74e605df0e66bd5670f557217720fb2871
hashfde67ba523b2c1e517d679ad4eaf87925c6bbf2f171b9212462dc9a855faa34b

Domain

ValueDescriptionCopy
domainallpdflive.com
domainbusinesspdf.com
domainconvertpdfplus.com
domaineasyonestartpdf.com
domainfastonestartpdf.com
domaingetonestart.co
domaingetonestartpdf.com
domaingetpdfonestart.com
domaingetsmartpdf.com
domaingopdfhub.com
domaingopdfmanuals.com
domainjustpdflab.com
domainmanualsbyonestart.com
domainmypdfonestart.com
domainonestartbrowser.com
domainpdf-central.com
domainpdfappsuite.com
domainpdfdoccentral.com
domainpdfeditorplus.com
domainpdfonestart.com
domainpdfonestarthub.com
domainpdfonestartlive.com
domainpdfonestarttoday.com
domainpdforsmartminds.com
domainprintwithonestart.com
domainproonestarthub.com
domainproonestartpdf.com
domainquickfastpdf.com
domainquickpdfmanuals.com
domainsmartonestartpdf.com
domainsmartviewpdf.com

Threat ID: 68b8a26bad5a09ad00fa1283

Added to database: 9/3/2025, 8:17:47 PM

Last enriched: 9/3/2025, 8:33:25 PM

Last updated: 9/4/2025, 2:28:34 PM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats