Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1566.002
(Phishing: Spearphishing Link) via Malvertising.
T1059.001
(Command and Scripting Interpreter: PowerShell) for memory-only staging.
T1055
(Process Injection) via direct syscalls into suspended browser processes.
T1553.004
(Install Root Certificate) to intercept HTTPS communications.
T1090
(Proxy) via PAC file manipulation.
T1115
(Clipboard Data) to hijack Boleto slips, Pix transactions, and Crypto wallets.
CVE Profile
No CVE (LOLBin/Malvertising)
CISA KEV Status: Inactive
Telemetry
Hashes EB0B4E35A2BA442821E28D617DD2DAA2 (NSIS)
D3A17CB4CDBA724A0021F5076B33A103 (Dropper)
28C314ACC587F1EA5C5666E935DB716C
(Main payload)
Domains
paletolife[.]com correioez0ubcfht9i3[.]lovehomely[.]com
mydigitalrevival[.]com
Registry Keys SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths.
Certificates
NSIS Installer signed by "PLK Management Limited".
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Issue immediate employee advisories regarding Google Ads malvertising targeting WhatsApp Web and Chrome downloads.
Command
Revoke trust in the code-signing certificate issued to "PLK Management Limited" within endpoint security policies.
DETECT (DE) – Monitoring & Analysis
Command
Deploy EDR hunting queries for PowerShell executing NetWebClient.UploadString without disk artifacts.
Command
Monitor endpoints for unauthorized local connections checking WebSocket port 27275.
RESPOND (RS) – Mitigation & Containment
Command
Isolate any endpoint resolving DNS queries to known GoPix C2 infrastructure (e.g., paletolife[.]com).
Command
Perform memory forensics on Explorer.exe and browser processes to locate DLLs with zeroed MZ signatures.
RECOVER (RC) – Restoration & Trust
Command
Reimage infected hosts entirely due to the stealthy installation of rogue Root Certificates and memory-resident implants.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Comman
Implement DNS-level blocking for untrusted ad networks.
Command
Restrict standard user rights to install new Root Certificate Authorities via GPO.
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Command
Disconnect from the internet immediately if you recently downloaded software (like WhatsApp or Chrome) from a sponsored search engine ad.
Command
Do not log into banking/email until verified clean.
Priority 2: Identity
Command
Reset all financial passwords and check cryptocurrency wallets using a known clean device (e.g., a mobile phone on a cellular network).
Priority 3: Persistence
Command
Open the Windows Certificate Manager (certmgr.msc) and delete any Root Certificates named "CN=Root CA 2024" or "CN=Root CA 2025".
Command
Check Windows proxy settings to ensure no malicious PAC script is configured to route your traffic.
Hardening & References
Baseline
CIS Benchmarks for Windows 10/11 (Enforce PowerShell Constrained Language Mode).
Framework
NIST CSF 2.0 / SP 800-61r3.
Source
Securelist / Kaspersky GReAT