Clark Flores
Written on

Malicious Chrome Extension (Let's Defend)

Challenge Write-up (Medium)

Lessons Learned:

How to analyze a malicious Chrome extension.

The Challenge:

The victim found out their private info was out there for everyone to see, and things got worse – the bad guys got into their money stuff, social media, and personal emails. We got an image of his machine so you can tell us what happened.

Answers

  1. What is the ID of the malicious extension? mmnbenehknklpbendgmgngeaignppnbe

Method: “C:\Users\USERNAME\AppData\Local\Google\Chrome\User Data\Default\Extensions”

Read the manifest.json for each extension found and check the permissions or script/function calls. Alternatively copy the file name and search it in Chrome Web Store to verify the identify for each extension.



  1. What is the name of the malicious extension? Netflix Party Official

Method: Check the _locales\en folder for the name and description of the Chrome extension.


  1. How many people were affected by this extension? 800,000

Method: Google-Fu using the name of the extension



  1. What is the attacker’s domain name? a1l4m[.]000webhostapp[.]com

Method: Check the b0.js and locate any suspicious domains indicated in the script.


  1. What is the full URL the attacker uses to exfiltrate the data? hxxps://a1l4m[.]000webhostapp[.]com/chrome/TrackData/

Method: Combine the value of “var e” with “/chrome/TrackData/”.


  1. What is the function name responsible for getting the victim’s location? get_location

Method: Review the script and found any line asking for location.


  1. What is the variable name that is responsible for storing the zip code of the victim? zip

Method: Review the script and found the line that records the zip code.