Software Impersonation Infrastructure
Delivery Chains
Redirect sequences captured by URLScan at the moment of scanning. A chain shows the full path from initial URL through any redirectors to the lure page and payload download. Coverage is best-effort — only available when the URL was submitted to URLScan while the infrastructure was active.
Payloads
Campaigns
Infrastructure
Samples
Detection Chokepoints
Perfect visual impersonation neutralizes every user-facing trust signal. These chokepoints survive it because they operate at the execution layer — after the user has already been deceived and run the file.
Alert when a process OriginalFilename from PE version resource does not match its running filename. Adversaries rename existing malicious binaries — they rarely recompile with matching resources.
detection:
selection:
Image|endswith:
- '\7-Zip.exe'
- '\VLC.exe'
- '\DiscordSetup.exe'
- '\NordVPN.exe'
- '\ZoomInstaller.exe'
CurrentDirectory|contains:
- '\Downloads\'
- '\AppData\Local\Temp\'
filter_legit:
OriginalFileName|contains:
- '7-Zip'
- 'VLC'
- 'Discord'
- 'NordVPN'
- 'Zoom'
condition: selection and not filter_legit
A signed binary running from Downloads is more anomalous than an unsigned one in managed environments. Legitimate signed software is deployed via package manager or IT tooling, not user download directories.
detection:
selection:
ParentImage|contains:
- '\chrome.exe'
- '\msedge.exe'
- '\firefox.exe'
Image|endswith:
- '\setup.exe'
- '\installer.exe'
- '\install.exe'
CurrentDirectory|contains: '\Downloads\'
Signed: 'true'
condition: selection
From one confirmed fake domain: fetch favicon, compute Murmur3 hash, query Shodan. Campaigns reusing the same stolen favicon across dozens of domains surface immediately.
http.favicon.hash:-469815234
http.favicon.hash:991727625
http.favicon.hash:9732861
http.favicon.hash:-1899664115