Rewterz Threat Alert – Vidar Malware – Active IOCs
February 8, 2022Rewterz Threat Alert – Microsoft’s ms-appinstaller Protocol Abused by Threat Groups – Active IOCs
February 8, 2022Rewterz Threat Alert – Vidar Malware – Active IOCs
February 8, 2022Rewterz Threat Alert – Microsoft’s ms-appinstaller Protocol Abused by Threat Groups – Active IOCs
February 8, 2022Severity
High
Analysis Summary
Amadey infects a victim’s computer and incorporates it into a. botnet. The Amadey trojan can also download additional malware. and exfiltrate user information to a command and control (C2) server. Moreover, it can engage the victim’s system. The threat actor sent spam emails that reference a package or shipment. Many of the emails claim in the subject line that the package or shipment is from the shipping company DHL. For example, one subject line is “You have a package coming from DHL.” The bodies of all of the emails we observed in this campaign are blank. Each email has a ZIP attachment containing a Visual Basic Script (VBS) file. Each file name for the ZIP files is a series of numbers separated by an underscore, such as 044450_64504154.zip. The VBS files have the same name as their ZIP file, except they have the VBS extension rather than the ZIP extension.
Impact
- Information Theft
- Exposure of Sensitive Data
Indicators of Compromise
MD5
- 1914c98f30bff8b31dc404ca52ede370
- 9d054bbe1cb8235f2a6c367794209c8b
- 775fdafd6bd3f881be4791019e8605b1
SHA-256
- 95d0cfda144353ec8be8413cad6c3edf53ec382bc87a9f59adbb849cbbd09ed4
- d771fc8db50712dd97967103599ae96f54ef86d20a23c13f088e0f0470c01c96
- 93bbc7e0f489125883985855949ed8a0929d44b5fea0c17db9113fff830793c9
SHA-1
- f42e1f3be6d02d4425aa1a777cbccce470ffaac6
- 6eca979a8c34c3ca4b77ad1c2db109fd8b5ff835
- 9195efad68f77e91ff52476c5c7240ac63c10cc3
Remediation
- Block all the threat indicators at your respective controls.
- Search for IOCs in your environment.
- Always be suspicious about emails sent by unknown senders.
- Never click on the links/attachments sent by unknown senders