Tracking TamperedChef Clusters via Certificate and Code Reuse

Tracking TamperedChef Clusters via Certificate and Code Reuse
This article describes multiple TamperedChef-style campaigns that distribute trojanized productivity apps such as PDF editors, calendars, and file tools, with activity clustered under CL-CRI-1089, CL-UNK-1090, and CL-UNK-1110. The campaigns use malvertising, code signing, delayed activation, and persistent C2 to deliver second-stage payloads like RATs, infostealers, proxy tooling, and browser hijackers. #TamperedChef #EvilAI #CL-CRI-1089 #CL-UNK-1090 #CL-UNK-1110

Keypoints

  • Multiple TamperedChef-style activity clusters overlap with the publicly described threat TamperedChef (aka EvilAI), but the article does not attribute them to one author or group.
  • The campaigns use fake productivity software, including PDF editors, calendars, ZIP tools, GIF makers, and file converters, to deliver malicious payloads.
  • The researchers tracked more than 4,000 samples across 100 unique variants and observed over 12,000 unique instances in their customer base.
  • Two major clusters, CL-CRI-1089 and CL-UNK-1090, were mapped through code-signing reuse, advertising overlaps, corporate structures, and OSINT.
  • Malicious activity often remains dormant for weeks or months before activation, then downloads second-stage payloads such as RATs, infostealers, proxy tools, and adware.
  • The operators rely heavily on malvertising, sponsored results, and search engine marketing, with some groups showing vertical integration between ad creation and malware signing.
  • The article highlights prevention and response steps such as EDR/XDR, browser hardening, token revocation, credential resets, and removal of persistence mechanisms.

MITRE Techniques

  • [T1583.001 ] Acquire Infrastructure: Domains – Attackers used legitimate-looking websites and unique campaign domains to host and distribute fake productivity apps (‘distributing via well-built, legitimate-looking websites’ and ‘leveraging unique and contextually relevant domains for each campaign’).
  • [T1071.001 ] Application Layer Protocol: Web Protocols – Campaigns used continuous C2 methods and upstream APIs to retrieve and run additional payloads (‘continuous command and control (C2) methods’ and ‘trigger the next stage… delivered via an upstream API’).
  • [T1204.002 ] User Execution: Malicious File – Victims were lured into downloading and running trojanized productivity software from ads and search results (‘malicious ads that direct users to sites hosting the applications’).
  • [T1112 ] Modify Registry – Persistence was often implemented through registry Run keys (‘implementing a robust persistence mechanism, almost always through scheduled tasks or registry Run keys’).
  • [T1053.005 ] Scheduled Task/Job: Scheduled Task – The malware established persistence by creating scheduled tasks (‘implementing a robust persistence mechanism, almost always through scheduled tasks’).
  • [T1027 ] Obfuscated Files or Information – Samples used obfuscation to hide malicious components and command strings (‘obfuscating the malicious components’ and ‘homoglyphs to obfuscate the incoming command strings’).
  • [T1036 ] Masquerading – Malware pretended to be legitimate productivity applications and used legitimate-looking branding, pages, and licensing terms (‘fake productivity applications’ and ‘appearing modern and credible’).
  • [T1587.001 ] Develop Capabilities: Malware – The actors created many custom variants and codebases for productivity-app malware (‘over 100 unique variants’ and ‘new codebase for each campaign’).
  • [T1113 ] Screen Capture – Some payloads gathered screen-related details from victims (‘screen size’).
  • [T1005 ] Data from Local System – Initial information gathering collected system and host details from infected machines (‘system version, hostname and active browsers’).
  • [T1016 ] System Network Configuration Discovery – Some campaigns collected geolocation and domain information from the environment (‘domain information, geolocation’).
  • [T1041 ] Exfiltration Over C2 Channel – Data and credentials were exfiltrated through malicious command-and-control infrastructure (‘exfiltrate users’ credentials’ and ‘continuous command and control’).
  • [T1219 ] Remote Access Software – The second stage often included RATs or access-broker-like behavior (‘deploying… remote access Trojans (RATs)’ and ‘behavior that resembles access brokers’).
  • [T1021 ] Remote Services – The malware enabled remote command execution and control over victim systems (‘execute commands remotely’).

Indicators of Compromise

  • [SHA256 ] PDB-bearing RapiDoc binaries identified in the article – 248de1470771904462c91f146074e49b3d7416844ec143ade53f4ac0487fdb44, 2231bfa7c7bd4a8ff12568074f83de8e4ec95c226230cccc6616a1a4416de268
  • [File name / archive component ] Calendaromatic sample structure – calendaromatic-win_x64.exe, resources.neu, and 7zSFX
  • [Domain ] Malicious infrastructure and landing pages mentioned in the article – onezipapp[.]com, pixel.toolname[.]com
  • [Website / URL ] Distribution and conditions pages referenced for malicious productivity software – hxxps[:]//www.crystalpdf[.]com/conditions
  • [Signer / organization names ] Code-signing entities associated with TamperedChef-style samples – CANDY TECH LTD, TAU CENTAURI LTD, MARKET FUSION INNOVATIONS LLC, CROWN SKY LLC, and 2 more items


Read more: https://unit42.paloaltonetworks.com/tracking-tampered-chef-clusters/