📖 Overview
A JavaScript payload associated with the Kongtuke malware family has been discovered hosted on a compromised domain masquerading as a restaurant website. The malicious script is delivered via js.php
, a common filename used in JavaScript injection attacks, and is believed to be part of a broader payload delivery campaign. Confidence is assessed at 100%.
📌 Key Details
Field | Information |
---|---|
Type | URL |
Indicator | https://prixmatech[.]com/js.php |
Threat Type | Payload Delivery |
Malware | js.kongtuke |
Confidence | 100% |
Date | 14 Oct 2025 – 18:19:55 UTC |
Tags | Kongtuke |
Reporter | monitorsg |
Reference | None |
🔎 URLScan Result
- Verdict Score: 0
- Page Title: Garbanzo Mediterranean Restaurant Near Me | Pita, Salad, Gyro, Bowls
- Screenshot: View Screenshot
- Result: Full Scan Report

📡 Related Intelligence
- VirusTotal Report: VirusTotal URL Report
🛡️ Defensive Guidance
- Block access to prixmatech[.]com and any requests to /js.php endpoints across DNS, proxy, and web gateways.
- Inspect web server logs for any evidence of injected JavaScript payloads or external script loading from suspicious domains.
- Monitor for execution of scripts or network calls tied to Kongtuke signatures.
- Deploy content security policies (CSP) to limit JavaScript execution from untrusted origins.
⚠️ This IOC highlights the use of legitimate-looking commercial websites as decoy fronts for distributing JavaScript-based malware like Kongtuke, which often targets users through embedded scripts or drive-by infection techniques.