PULSE NAME
New malware campaign discovered via ManualFinder
WHITE AlienVault 2025-09-03 Modified: 2025-09-03
59
IOCs
HIGH VOLUME
A global malware infection of Windows computers has been uncovered, stemming from software users installed themselves. The malware, disguised as legitimate PDF editors and manual finders, turns infected systems into residential proxies for malicious actors. The infection chain starts with deceptive ads posing as PDF manuals. The campaign, which appears to have ceased, was widespread due to large-scale advertising. The malware creates scheduled tasks, executes JavaScript files, and communicates with various C2 domains. It's potentially linked to the OneStart Browser, known for spreading spyware and adware. Authorities advise blocking access to related domains, checking for specific applications, and removing software signed by certain certificate issuers.
Indicators of Compromise (8 / 59 total)
All FileHash-MD5 FileHash-SHA1 FileHash-SHA256 domain
TYPEINDICATORDESCRIPTIONCREATED
FileHash-MD5 192b80bab47bce9b96f683409db2fe61 2025-09-03
FileHash-MD5 213eca72f00563fa2ed788a1212c67e0 2025-09-03
FileHash-MD5 56fff546ce738e76884611ca49c5751c 2025-09-03
FileHash-MD5 62e43638548bbe4909eaf8408d8b5686 2025-09-03
FileHash-MD5 6b5e479394633f4af9957df1d847c665 2025-09-03
FileHash-MD5 6fd6c053f8fcf345efaa04f16ac0bffe 2025-09-03
FileHash-MD5 a5d7966e70b62f95ec2e3d18f5f8ab2a 2025-09-03
FileHash-MD5 b87167c7e4d8c0b180fc6a6a6643069c 2025-09-03