Rewterz Threat Alert – DanaBot Trojan – Active IOCs
June 5, 2023CVE-2023-33143 – Microsoft Edge (Chromium-based) Vulnerability
June 6, 2023Rewterz Threat Alert – DanaBot Trojan – Active IOCs
June 5, 2023CVE-2023-33143 – Microsoft Edge (Chromium-based) Vulnerability
June 6, 2023Severity
Medium
Analysis Summary
Amadey is a botnet, a type of malicious software that infects computers and turns them into “bots” or “zombies” that can be controlled remotely by an attacker. Botnets are often used to carry out cyber attacks, such as spamming, distributed denial-of-service (DDoS) attacks, and data theft. The Amadey trojan can also download additional malware. and exfiltrate user information to a command and control (C2) server. Moreover, it can engage the victim’s system. The threat actor sent spam emails that reference a package or shipment. Many of the emails claim in the subject line that the package or shipment is from the shipping company DHL. For example, “You have a package coming from DHL.” The bodies of all of the emails we observed in this campaign are blank. Each email has a ZIP attachment containing a Visual Basic Script (VBS) file. Each file name for the ZIP files is a series of numbers separated by an underscore, such as 044450_64504154.zip. The VBS files have the same name as their ZIP file, except they have the VBS extension rather than the ZIP extension.
Amadey has been observed targeting a wide range of organizations, including government agencies, financial institutions, and technology companies. The Amadey botnet is a sophisticated and flexible threat that poses a significant risk to organizations and individuals. To defend against Amadey and other botnets, it is important to keep software up to date, follow best practices for cybersecurity, and to use a combination of security tools and services.
Impact
- Information Theft
- Exposure of Sensitive Data
Indicators of Compromise
MD5
- 17e2bfb09df5919740f99e5b9f698425
- ea15d9dc0723fd173945c7c35be4b3a5
- 0e9174e9f3b52a4c5820c9c67466cf53
- 5f8b609b8b8aac549635a9c0a8880cb8
- 8dee1641565195210f8d18051ad931a0
- 9029d1f14f684731fd85ba8e80da92cf
- 463e2c4a1967b0a7f7f633a6215026ef
- 0761711acb836cd3822f860fbad54585
- 87ac5579e89825723012dc3d8460cdb3
- 63d1d0f974d187e4f464a314bda3f99d
SHA-256
- 3ec6b295ec6e7d9441dc3fadd7969f9999916a0a8d6da41ef871abede9365bbb
- 60bb3e66aead037051760813844818c37fd1194d1a1e285e25fc0ded8201d56f
- c4400514befd38c4870a6adba9e55b862bb249d791fae3cc6aae2666bacf0f04
- f61eba6af7d997de710cf9dab046d6eab1e536b5c9e5d987223dea0c66101ae7
- 71a35fe403a4e41182eb707e3a7d76821034b494551ee67432afd6e7fa82e864
- d7e1af2362cb778e3ba97174915da73fcd8fb4df49363fb09267eb28db27e77b
- e9bc1461c10946308fa4a0fb16f274108d80c351068ca95b5698a5a51d3b6de7
- f845e9d8bad6f1cada0619c5f033c4e3cb7a5c3f55886eef9b2a0ebecd17df6a
- 1ec5ecec7452379c2d19c80bb25effff79414ab2faf5c32d0dada42e1935be50
- 5330f5956dda9f4531291237e81b4ed6d9a7321a936eecda109c3bede5e89140
SHA-1
- 427be3fcabfde476746de131511b951c4760518e
- 91fb7a7092a5cdf8178b84f6f5cff6d7dff01806
- dc66222a7629b50743942d117b327daab27fe756
- cf4d06d3376f6c9ad5fe51635bceae0cc9f46719
- 73865a4c1c11ff4fedab50a8d836cc610a91a61e
- 8281a329b5ce0190541a362a24be52178b8edc02
- 8a5d4e457909faae63080b6468baa7e7872bb38d
- 91bb422b43b6c2d92470fa1271e7583530c2c6fd
- e815ebca53a363f6d810ece7028b6adcc720d711
- df3e83942d17bc8d14d584e931589319c1d1b6d6
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicators of compromise (IOCs) in your environment utilizing your respective security controls
- Maintain cyber hygiene by updating your anti-virus software and implementing a patch management lifecycle.
- Maintain Offline Backups – In a ransomware attack, the adversary will often delete or encrypt backups if they have access to them. That’s why it’s important to keep offline (preferably off-site), encrypted backups of data and test them regularly.
- Emails from unknown senders should always be treated with caution.
- Never trust or open ” links and attachments received from unknown sources/senders.
- Patch and upgrade any platforms and software timely and make it into a standard security policy. Prioritize patching known exploited vulnerabilities and zero-days.
- Along with network and system hardening, code hardening should be implemented within the organization so that their websites and software are secure. Use testing tools to detect any vulnerabilities in the deployed codes.
- Enable antivirus and anti-malware software and update signature definitions in a timely manner. Using multi-layered protection is necessary to secure vulnerable assets