Skip to content

Instantly share code, notes, and snippets.

View farkroft's full-sized avatar
🎯
Focusing

Fajar A. R. farkroft

🎯
Focusing
View GitHub Profile
@cometkim
cometkim / ANALYSIS_OPUS.md
Created March 10, 2026 08:12
AppsFlyer SDK compromised 2026-03-10

Analysis: Cryptocurrency Address Hijacker (Man-in-the-Browser Clipper)

This is a supply-chain cryptocurrency stealing payload — a "clipper" or "address swapper" that silently redirects crypto transactions to attacker-controlled wallets.

Core Architecture

The payload has four layers:

1. String Obfuscation Engine The bulk of the code is a multi-layered string decoding system (oFmFNH, iVp0dU7, byZJpo, fLOUxWf, etc.) using base91-like encoding with shuffled alphabets. Every meaningful string is encoded to evade static analysis.