New malware campaign discovered via ManualFinder
A global malware infection of Windows computers has been uncovered, stemming from software users installed themselves. The malware, disguised as legitimate PDF editors and manual finders, turns infected systems into residential proxies for malicious actors. The infection chain starts with deceptive ads posing as PDF manuals. The campaign, which appears to have ceased, was widespread due to large-scale advertising. The malware creates scheduled tasks, executes JavaScript files, and communicates with various C2 domains. It's potentially linked to the OneStart Browser, known for spreading spyware and adware. Authorities advise blocking access to related domains, checking for specific applications, and removing software signed by certain certificate issuers.
AI Analysis
Technical Summary
A recent malware campaign targeting Windows systems has been uncovered, involving malicious software disguised as legitimate PDF editors and manual finder tools. The infection vector primarily involved deceptive online advertisements that tricked users into downloading and installing these fake applications under the guise of accessing PDF manuals. Once installed, the malware establishes persistence by creating scheduled tasks and executing JavaScript files to maintain control over the infected system. It communicates with multiple command and control (C2) domains to receive instructions and potentially exfiltrate data. A notable aspect of this campaign is that infected machines are repurposed as residential proxies, allowing threat actors to route malicious traffic through these compromised endpoints, thereby masking their activities and complicating attribution. The campaign is potentially linked to the OneStart Browser, a known distributor of spyware and adware, suggesting a broader ecosystem of unwanted software distribution. The malware employs various techniques consistent with MITRE ATT&CK tactics such as scheduled task creation (T1053.005), script execution (T1059.007), masquerading (T1036.005), user execution (T1204.002), code signing abuse (T1553.002), signed binary proxy execution (T1218.007), persistence mechanisms (T1547.001), data staging (T1102.002), obfuscated files or information (T1027.002), and command and control communication (T1071.001). Although the campaign appears to have ceased, its widespread nature was facilitated by large-scale advertising campaigns, increasing the infection footprint globally. Authorities recommend blocking access to associated domains, auditing systems for suspicious applications, and removing software signed by specific certificate issuers linked to the malware distribution chain.
Potential Impact
For European organizations, this malware campaign poses several risks. The transformation of infected systems into residential proxies can facilitate further malicious activities such as anonymizing cyberattacks, distributing spam, or conducting fraudulent transactions, indirectly implicating the victim organizations in illicit activities. The presence of spyware and adware components can lead to data leakage, privacy violations, and potential intellectual property theft. Scheduled tasks and persistent JavaScript execution increase the difficulty of detection and removal, potentially allowing long-term unauthorized access. The abuse of legitimate-looking software and code signing certificates undermines trust in software supply chains, complicating endpoint security efforts. Given the campaign’s use of deceptive advertising, employees in organizations with less mature cybersecurity awareness programs may be more susceptible to infection. Additionally, the malware’s network communications could lead to bandwidth consumption and network performance degradation. The indirect reputational damage and potential regulatory implications under GDPR for data breaches or unauthorized data processing further elevate the threat to European entities.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to this threat. First, enhance endpoint detection capabilities to identify and block installation of unauthorized PDF editors or manual finder applications, especially those not sourced from verified vendors. Deploy application whitelisting to prevent execution of unapproved software and scheduled tasks. Network defenses should include blocking known malicious C2 domains and monitoring for unusual outbound traffic patterns indicative of proxy activity. Conduct regular audits of installed software and digital certificates to identify and remove applications signed by suspicious or untrusted certificate authorities. User awareness training should emphasize the risks of downloading software from unverified sources and recognizing deceptive advertisements. Employ advanced threat hunting techniques to detect persistence mechanisms such as scheduled tasks and obfuscated JavaScript files. Integrate threat intelligence feeds referencing this campaign to stay updated on emerging indicators of compromise. Finally, consider implementing network segmentation to limit lateral movement and isolate potentially infected systems.
Affected Countries
Netherlands, Germany, France, United Kingdom, Italy, Spain, Poland
Indicators of Compromise
- hash: 192b80bab47bce9b96f683409db2fe61
- hash: 213eca72f00563fa2ed788a1212c67e0
- hash: 56fff546ce738e76884611ca49c5751c
- hash: 62e43638548bbe4909eaf8408d8b5686
- hash: 6b5e479394633f4af9957df1d847c665
- hash: 6fd6c053f8fcf345efaa04f16ac0bffe
- hash: a5d7966e70b62f95ec2e3d18f5f8ab2a
- hash: b87167c7e4d8c0b180fc6a6a6643069c
- hash: 1b77beedb0b99bf5430c1a18315302399d07812c
- hash: 1eb5be9e5662811fa1412287fa8e5a2d88d0a4d2
- hash: 21df00ac8bf8baa1111f3fc564d27a9eabf0f097
- hash: 2ecd25269173890e04fe00ea23a585e4f0a206ad
- hash: 99201eee9807d24851026a8e8884e4c40245fac7
- hash: a2278eb6a438dc528f3ebfeb238028c474401bef
- hash: c60c964e4e0d40e5d038950d75db60b84d4cd911
- hash: d249a92c9594c0410570a01abe2fce4cd16f762d
- hash: e0db7b5eaf92feff220c805b0e5f3d8916e18d51
- hash: f734dc5fb78cf67e63eae2830e656a70c015db15
- hash: 372d89d7dd45b2120f45705a4aa331dfff813a4be642971422e470eb725c4646
- hash: 46c9f63648d1a0fab977ec7b921ee1111a85402591984b12bd41391ecb2f5d6e
- hash: 6bf2cc4e9d9901541214d7efc8bb8bb24ef5bddc238598333c843e421c042c6b
- hash: 71edb9f9f757616fe62a49f2d5b55441f91618904517337abd9d0725b07c2a51
- hash: cb15e1ec1a472631c53378d54f2043ba57586e3a28329c9dbf40cb69d7c10d2c
- hash: d9f9584f4f071be9c5cf418cae91423c51d53ecf9924ed39b42028d1314a2edc
- hash: da3c6ec20a006ec4b289a90488f824f0f72098a2f5c2d3f37d7a2d4a83b344a0
- hash: e95de8452d32b439e0286868ed16f63943af3bc059dca6bcb48d1cbe2431440e
- hash: ed797beb927738d68378cd718ea0dc74e605df0e66bd5670f557217720fb2871
- hash: fde67ba523b2c1e517d679ad4eaf87925c6bbf2f171b9212462dc9a855faa34b
- domain: allpdflive.com
- domain: businesspdf.com
- domain: convertpdfplus.com
- domain: easyonestartpdf.com
- domain: fastonestartpdf.com
- domain: getonestart.co
- domain: getonestartpdf.com
- domain: getpdfonestart.com
- domain: getsmartpdf.com
- domain: gopdfhub.com
- domain: gopdfmanuals.com
- domain: justpdflab.com
- domain: manualsbyonestart.com
- domain: mypdfonestart.com
- domain: onestartbrowser.com
- domain: pdf-central.com
- domain: pdfappsuite.com
- domain: pdfdoccentral.com
- domain: pdfeditorplus.com
- domain: pdfonestart.com
- domain: pdfonestarthub.com
- domain: pdfonestartlive.com
- domain: pdfonestarttoday.com
- domain: pdforsmartminds.com
- domain: printwithonestart.com
- domain: proonestarthub.com
- domain: proonestartpdf.com
- domain: quickfastpdf.com
- domain: quickpdfmanuals.com
- domain: smartonestartpdf.com
- domain: smartviewpdf.com
New malware campaign discovered via ManualFinder
Description
A global malware infection of Windows computers has been uncovered, stemming from software users installed themselves. The malware, disguised as legitimate PDF editors and manual finders, turns infected systems into residential proxies for malicious actors. The infection chain starts with deceptive ads posing as PDF manuals. The campaign, which appears to have ceased, was widespread due to large-scale advertising. The malware creates scheduled tasks, executes JavaScript files, and communicates with various C2 domains. It's potentially linked to the OneStart Browser, known for spreading spyware and adware. Authorities advise blocking access to related domains, checking for specific applications, and removing software signed by certain certificate issuers.
AI-Powered Analysis
Technical Analysis
A recent malware campaign targeting Windows systems has been uncovered, involving malicious software disguised as legitimate PDF editors and manual finder tools. The infection vector primarily involved deceptive online advertisements that tricked users into downloading and installing these fake applications under the guise of accessing PDF manuals. Once installed, the malware establishes persistence by creating scheduled tasks and executing JavaScript files to maintain control over the infected system. It communicates with multiple command and control (C2) domains to receive instructions and potentially exfiltrate data. A notable aspect of this campaign is that infected machines are repurposed as residential proxies, allowing threat actors to route malicious traffic through these compromised endpoints, thereby masking their activities and complicating attribution. The campaign is potentially linked to the OneStart Browser, a known distributor of spyware and adware, suggesting a broader ecosystem of unwanted software distribution. The malware employs various techniques consistent with MITRE ATT&CK tactics such as scheduled task creation (T1053.005), script execution (T1059.007), masquerading (T1036.005), user execution (T1204.002), code signing abuse (T1553.002), signed binary proxy execution (T1218.007), persistence mechanisms (T1547.001), data staging (T1102.002), obfuscated files or information (T1027.002), and command and control communication (T1071.001). Although the campaign appears to have ceased, its widespread nature was facilitated by large-scale advertising campaigns, increasing the infection footprint globally. Authorities recommend blocking access to associated domains, auditing systems for suspicious applications, and removing software signed by specific certificate issuers linked to the malware distribution chain.
Potential Impact
For European organizations, this malware campaign poses several risks. The transformation of infected systems into residential proxies can facilitate further malicious activities such as anonymizing cyberattacks, distributing spam, or conducting fraudulent transactions, indirectly implicating the victim organizations in illicit activities. The presence of spyware and adware components can lead to data leakage, privacy violations, and potential intellectual property theft. Scheduled tasks and persistent JavaScript execution increase the difficulty of detection and removal, potentially allowing long-term unauthorized access. The abuse of legitimate-looking software and code signing certificates undermines trust in software supply chains, complicating endpoint security efforts. Given the campaign’s use of deceptive advertising, employees in organizations with less mature cybersecurity awareness programs may be more susceptible to infection. Additionally, the malware’s network communications could lead to bandwidth consumption and network performance degradation. The indirect reputational damage and potential regulatory implications under GDPR for data breaches or unauthorized data processing further elevate the threat to European entities.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to this threat. First, enhance endpoint detection capabilities to identify and block installation of unauthorized PDF editors or manual finder applications, especially those not sourced from verified vendors. Deploy application whitelisting to prevent execution of unapproved software and scheduled tasks. Network defenses should include blocking known malicious C2 domains and monitoring for unusual outbound traffic patterns indicative of proxy activity. Conduct regular audits of installed software and digital certificates to identify and remove applications signed by suspicious or untrusted certificate authorities. User awareness training should emphasize the risks of downloading software from unverified sources and recognizing deceptive advertisements. Employ advanced threat hunting techniques to detect persistence mechanisms such as scheduled tasks and obfuscated JavaScript files. Integrate threat intelligence feeds referencing this campaign to stay updated on emerging indicators of compromise. Finally, consider implementing network segmentation to limit lateral movement and isolate potentially infected systems.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.ncsc.nl/actueel/nieuws/2025/08/29/nieuwe-malwarecampagne-ontdekt-via-manualfinder"]
- Adversary
- null
- Pulse Id
- 68b8a1182ec5c19a3c05af6f
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash192b80bab47bce9b96f683409db2fe61 | — | |
hash213eca72f00563fa2ed788a1212c67e0 | — | |
hash56fff546ce738e76884611ca49c5751c | — | |
hash62e43638548bbe4909eaf8408d8b5686 | — | |
hash6b5e479394633f4af9957df1d847c665 | — | |
hash6fd6c053f8fcf345efaa04f16ac0bffe | — | |
hasha5d7966e70b62f95ec2e3d18f5f8ab2a | — | |
hashb87167c7e4d8c0b180fc6a6a6643069c | — | |
hash1b77beedb0b99bf5430c1a18315302399d07812c | — | |
hash1eb5be9e5662811fa1412287fa8e5a2d88d0a4d2 | — | |
hash21df00ac8bf8baa1111f3fc564d27a9eabf0f097 | — | |
hash2ecd25269173890e04fe00ea23a585e4f0a206ad | — | |
hash99201eee9807d24851026a8e8884e4c40245fac7 | — | |
hasha2278eb6a438dc528f3ebfeb238028c474401bef | — | |
hashc60c964e4e0d40e5d038950d75db60b84d4cd911 | — | |
hashd249a92c9594c0410570a01abe2fce4cd16f762d | — | |
hashe0db7b5eaf92feff220c805b0e5f3d8916e18d51 | — | |
hashf734dc5fb78cf67e63eae2830e656a70c015db15 | — | |
hash372d89d7dd45b2120f45705a4aa331dfff813a4be642971422e470eb725c4646 | — | |
hash46c9f63648d1a0fab977ec7b921ee1111a85402591984b12bd41391ecb2f5d6e | — | |
hash6bf2cc4e9d9901541214d7efc8bb8bb24ef5bddc238598333c843e421c042c6b | — | |
hash71edb9f9f757616fe62a49f2d5b55441f91618904517337abd9d0725b07c2a51 | — | |
hashcb15e1ec1a472631c53378d54f2043ba57586e3a28329c9dbf40cb69d7c10d2c | — | |
hashd9f9584f4f071be9c5cf418cae91423c51d53ecf9924ed39b42028d1314a2edc | — | |
hashda3c6ec20a006ec4b289a90488f824f0f72098a2f5c2d3f37d7a2d4a83b344a0 | — | |
hashe95de8452d32b439e0286868ed16f63943af3bc059dca6bcb48d1cbe2431440e | — | |
hashed797beb927738d68378cd718ea0dc74e605df0e66bd5670f557217720fb2871 | — | |
hashfde67ba523b2c1e517d679ad4eaf87925c6bbf2f171b9212462dc9a855faa34b | — |
Domain
Value | Description | Copy |
---|---|---|
domainallpdflive.com | — | |
domainbusinesspdf.com | — | |
domainconvertpdfplus.com | — | |
domaineasyonestartpdf.com | — | |
domainfastonestartpdf.com | — | |
domaingetonestart.co | — | |
domaingetonestartpdf.com | — | |
domaingetpdfonestart.com | — | |
domaingetsmartpdf.com | — | |
domaingopdfhub.com | — | |
domaingopdfmanuals.com | — | |
domainjustpdflab.com | — | |
domainmanualsbyonestart.com | — | |
domainmypdfonestart.com | — | |
domainonestartbrowser.com | — | |
domainpdf-central.com | — | |
domainpdfappsuite.com | — | |
domainpdfdoccentral.com | — | |
domainpdfeditorplus.com | — | |
domainpdfonestart.com | — | |
domainpdfonestarthub.com | — | |
domainpdfonestartlive.com | — | |
domainpdfonestarttoday.com | — | |
domainpdforsmartminds.com | — | |
domainprintwithonestart.com | — | |
domainproonestarthub.com | — | |
domainproonestartpdf.com | — | |
domainquickfastpdf.com | — | |
domainquickpdfmanuals.com | — | |
domainsmartonestartpdf.com | — | |
domainsmartviewpdf.com | — |
Threat ID: 68b8a26bad5a09ad00fa1283
Added to database: 9/3/2025, 8:17:47 PM
Last enriched: 9/3/2025, 8:33:25 PM
Last updated: 9/4/2025, 2:28:34 PM
Views: 6
Related Threats
Not Safe for Work: Tracking and Investigating Stealerium and Phantom Infostealers
MediumEthereum smart contracts used to push malicious code on npm
MediumGoogle Salesforce Breach: A Deep dive into the chain and extent of the compromise
MediumMalicious Campaign Targeting Diplomatic Assets
MediumTax refund scam targets Californians
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.