TL;DR

ConvertyFile is a browser hijacker, delivered via ads, that changes the browser’s default search engine.

Tactical Pause

THE CONTENT, VIEWS, AND OPINIONS EXPRESSED ON THIS DOCUMENT ARE MY OWN AND DO NOT REFLECT THOSE OF MY EMPLOYER OR ANY AFFILIATED ORGANIZATIONS. ALL RESEARCH, ANALYSIS, AND WRITING ARE CONDUCTED ON MY PERSONAL TIME AND USING MY OWN PERSONALLY-ACQUIRED RESOURCES. ANY REFERENCES, TOOLS, OR SOFTWARE MENTIONED HERE ARE LIKEWISE USED INDEPENDENTLY AND ARE NOT ASSOCIATED WITH, ENDORSED, OR FUNDED BY MY EMPLOYER.

Summary Up Front

ConvertyFile is a Browser Hijacker. This documents my analysis on ConvertyFile. It starts with an ad on govsalaries[.]com from Red Root LTD for ConvertyFile. This was written in GO, and I’m not at that level to RE it yet. I used Any Run to interact with the sample, and to pull PCAP. I assess that ConvertyFile is linked to ConvertMaster.

Intro

This continues from my analysis on ConvertMaster [1]. ConvertyFile is a Browser Hijacker.

Google Advertisement

This ad was served again from govsalaries[.]com. I will likely continue to pull converter ads from their site as the browser hijackers become available.

The advertiser is Red Root LTD. The snip below is from Google Ad Transparency.

Delivery

The link leads you to “hxxps[:]//convertyfileapp[.]com”. Follow my work here [2]!

Convertyfile.exe (SHA256: 3d82200083a86df09c3b16c9095b844738a76863b1b01092b6c4dbef3b974b12) is served from “hxxps[:]//lukgio[.]com/condl”. Keep in mind that there will be parameters in the lukgio domain.

I’m A/B testing with the snip width… be a bear with me.

Execution

These are the install views that are similar to Convert Master. It covers the screen to ensure you don’t see the browser activities in the background.

This is the success page.

The snip below shows the shortcut on the desktop, and the properties. I show this because this is the same behavior as Convert Master. The online converter is portite[.]com.

This is a snip of the portite site. Note how Convert Master also used a desktop link to bring the user to an online converter.

Config Server

The snip shows the response to the POST request to “hxxps[:]//olienti[.]com/vars” contains the dynamic configs. From this I glean the target browser is FireFox, and the injected search URL starts with “hxxps[:]//scep.sqlokik[.]com”.

I assume the POST request to “hxxps[:]//olienti[.]com/boom” must mean “success”.

The POST request to “hxxps[:]//olienti[.]com/pass” appears to contain metrics. I assume this must be for chargeback to the “sqlokik” customer.

Search Hijack Flow

The snip below shows my search “what is sqlokik and does it use searchretrorevive[.]com too” goes to scep.sqlokik[.]com.

The snip below shows that search is redirected to “hxxps[:]//searchdreamytab[.]com/search/?”

The snip below shows that gets redirected to Yahoo search.

Closing Thoughts

This shares many similarities with Convert Master. I think they’re related based on the deliver ads, the delivery chain, the objectives of browser hijacking to inject the default search engine, and the unique behavior of creating a desktop shortcut that just goes to an online converter. In addition to those similarities, I present to you the Silent Push snip below that shows both domains were observed using the same Google Ad ID.

datasource = [“webscan”] AND body_analysis.google-GA4 = “G-SS88ENC0JT”

Summary

ConvertyFile is a Browser Hijacker. This documents my analysis on ConvertyFile. It starts with an ad on govsalaries[.]com from Red Root LTD for ConvertyFile. This was written in GO, and I’m not at that level to RE it yet. I used Any Run to interact with the sample, and to pull PCAP. I assess that ConvertyFile is linked to ConvertMaster.

References

1 – https://malasada.tech/convert-master-browser-hijacker-analysis/

2 – https://app.any.run/tasks/de978f20-813b-40b5-86ae-a14e09016fa7

IOCs

3d82200083a86df09c3b16c9095b844738a76863b1b01092b6c4dbef3b974b12
convertyfileapp[.]com
lukgio[.]com
portite[.]com
olienti[.]com
scep.sqlokik[.]com
searchdreamytab[.]com
hxxps[:]//convertyfileapp[.]com
hxxps[:]//lukgio[.]com/condl
hxxps[:]//portite[.]com/
hxxps[:]//olienti[.]com/vars
hxxps[:]//scep.sqlokik[.]com
hxxps[:]//olienti[.]com/boom
hxxps[:]//olienti[.]com/pass
hxxps[:]//searchdreamytab[.]com/search/

WITH PLANNY ALOHA, MAHALO FOR YOUR TIME

One thought on “ConvertyFile Browser Hijacker”

Comments are closed.