Quick Triage - Obsidian Malware Campaign

Quick Triage - Obsidian Malware Campaign

Intake

In July 2024, a user on the subreddit for the note-taking application Obsidian made a post warning users of a malicious site masquerading as Obsidian's homepage, obsidian.md.

The malicious website (obsidianworking[.]com) was shut down almost immediately after the initial reddit post was made, but some archives exist, which will provide an opportunity to quickly triage this site. I am only interested in some quick pivots, and determining if this is a phishing scam or infostealer dropper.

Triage Notes

Malicious URL: obsidianworking[.]com/main.php

The site is unavailable, but an archive is available at URLscan.io.

Screenshot of what the page appeared like, from URLscan.io

A quick glance at the DOM shows the malicious site is basically a carbon copy of the legitimate Obsidian site, but some extra javascript pasted in. The js is lightly obfuscated, and we can surmise the endpoints contacted by the script are likely downloading something malicious. Looking at the site in VirusTotal, we can see that the website downloads a file called "obsidian.exe"

While google dorking the domain, I came across this article by hyde at solothreats, which gives a detailed run-down of the infection chain. Hyde was able to analyze the malicious domain when it was still online, and documented it dropping likely infostealers targeting PC and Mac operating systems.

This is the extent of the triage, but one thing I want to point out is the two malware samples targeting Windows are each signed with a compromised certificate. These signers stood out like a sore thumb. Here they are for each of the Windows samples.

b4346702b4b5029cbd627b5df724550f8b783ba22876e5070dadc0ed5c214df2

1662a66e1a343e91964017b085ce85f4167b802f3f7c47e4e9c8b2e9a52e77b1

Thankfully, they have already been revoked explicitly by the CA, so no need to further report. But if they were still up, I would have used the certReport utility by Squiblydoo.

Virustotal Graph

With just one pivot in VT graphs, some of our IOCs overlap with Rhadamanthys IOCs.

IOCs

IOCs are available to download at the following locations:

Network

Type Value Comment
domain obsidianworking.com original domain which triggered the investigation. It is masquerading as the legitimate obsidian domain (obsidian.md). Further analysis indicates it drops windows or mac malware.
domain gztxbb.com [solothreats] Downloads Mac malware. Hyde noted that the code on this site was continuously updated during the observation period.
domain dropsforbox.com [solothreats] Downloads Windows malware
domain adminnnnnxxxxx123.com [solothreats] Likely tracker for clicks on phishing domain.
domain adminforbusiness.com [solothreats] Likely tracker for clicks on phishing domain.
ipv4 46.4.13.241 [solothreats] IP which the gztxbb[.]com domain was resolving to at the time of Hyde's artcile.

File

Type Value Comment
sha256 1662a66e1a343e91964017b085ce85f4167b802f3f7c47e4e9c8b2e9a52e77b1 [solothreats] filename: obsidian.exe. Windows malware masquerading as the notetaking app Obsidian.
sha256 b4346702b4b5029cbd627b5df724550f8b783ba22876e5070dadc0ed5c214df2 [solothreats] filename: Obsidian_Installer_v.3.15.exe. Windows malware masquerading as the notetaking app Obsidian.
sha256 2d52d65e91ead764be7e9c4e1bb5e97d4becbcb0f2314c445c18a6bb24b91de4 [solothreats] filename: Obsidian_v.1.7.malware.dmg. Mac malware masquerading as Obsidian. Possibly AMOS steler.
sha256 46ed397a3907971ffdf3111ec78c23022e5f6037b409404af30acd5865a02670 [solothreats] Filename: Obsidian_v.2.10.dmg. Mac malware masquerading as Obsidian. Possibly AMOS stealer.