Technical Analysis & Remediation
MITRE ATT&CK Mapping
T1059
(Command and Control)
T1083
(File and Directory Discovery)
T1120
(Peripheral Device Discovery)
T1614
(System Location Discovery)
T1001.00
(Data Obfuscation: Protocol or Service)
CVE Profile
N/A (Social Engineering / Trust-Trick Vector)
CISA KEV Status: Inactive.
Telemetry
Network IOCs
"dltruek[.]com/helpU.php", "ldture[.]com"
Blockchain IOCs (BNB TestNet Contracts)
"0x7a09296149Ad75745d805CFc4ce215573b442F90" (Stage 1)
0xdd3bd9879e5a3bb6c6b0eb193c99418e5c8ba6c9 (Stage 2)
Constraint
Exact payload hashes are not present in the provided telemetry; the structure resembles standard infostealer/botnet reconnaissance behaviors targeting system information and device names.
Remediation - THE ENTERPRISE TRACK (NIST SP 800-61r3 / CSF 2.0)
GOVERN (GV) – Crisis Management & Oversight
Command
Issue a security bulletin warning developers and IT personnel about typosquatted tools (specifically Tesseract OCR) and the dangers of "ClickFix" verification prompts.
DETECT (DE) – Monitoring & Analysis
Command
Deploy SIEM queries to monitor for anomalous PowerShell or Windows Script Host executions originating from clipboard commands.
Command
Alert on DNS requests or outbound traffic to dltruek.com and ldture.com.
RESPOND (RS) – Mitigation & Containment
Command
Block the identified C2 domains (dltruek.com, ldture.com) at the perimeter firewall/DNS sinkhole.
Command
Isolate any endpoint observed querying these domains or exhibiting unauthorized system/peripheral discovery behaviors (T1083, T1120).
RECOVER (RC) – Restoration & Trust
Command
Reimage compromised developer workstations, as botnet persistence mechanisms may be obscured by the multi-stage deployment.
IDENTIFY & PROTECT (ID/PR) – The Feedback Loop
Command
Restrict standard user accounts from executing unverified scripts via clipboard interfaces (e.g., locking down PowerShell execution policies).
Remediation - THE HOME USER TRACK (Safety Focus)
Priority 1: Safety
Command
If you have recently attempted to download Tesseract OCR and were prompted to copy/paste code to "fix" an error, disconnect from the internet immediately.
Command
Do not log into banking/email until verified clean.
Priority 2: Identity
Command
Reset passwords/MFA using a known clean device (e.g., phone on 5G), as the malware harvests system and peripheral data.
Priority' 3: Persistence
Command
Check Scheduled Tasks, Startup Folders, and Browser Extensions for unknown entries, and run a comprehensive scan with a reputable endpoint security product.
Hardening & References
Baseline
CIS Benchmarks for Windows 10/11 (Enforce restrictive PowerShell Execution Policies).
Framework
NIST CSF 2.0 (PR.AT-1: User awareness training regarding "ClickFix" / Clipboard trust-tricks).
Style
Decentralized C2 routing (EtherHiding) necessitates DNS and network-layer defense in depth, rather than relying solely on static IP blocking.
Source
CYJAX Threat Intel