Rewterz Threat Alert – DanaBot Trojan – Active IOCs
November 29, 2021Rewterz Threat Alert – Active Agent Tesla Campaign Targeting Financial Sector
November 29, 2021Rewterz Threat Alert – DanaBot Trojan – Active IOCs
November 29, 2021Rewterz Threat Alert – Active Agent Tesla Campaign Targeting Financial Sector
November 29, 2021Severity
High
Analysis Summary
Amadey infects a victim’s computer and incorporates it into a. botnet. The Amadey trojan can also download additional malware. and exfiltrate user information to a command and control (C2) server. Moreover, it can engage the victim’s system. The threat actor sent spam emails that reference a package or shipment. Many of the emails claim in the subject line that the package or shipment is from the shipping company DHL. For example, one subject line is “You have a package coming from DHL.” The bodies of all of the emails we observed in this campaign are blank. Each email has a ZIP attachment containing a Visual Basic Script (VBS) file. Each file name for the ZIP files is a series of numbers separated by an underscore, such as 044450_64504154.zip. The VBS files have the same name as their ZIP file, except they have the VBS extension rather than the ZIP extension.
Impact
- Information Theft
- Exposure of Sensitive Data
Indicators of Compromise
MD5
- 2391dbe5f5dc587eab3321869dd43ec5
- 58f2c7d3bc9eff6414d8df9b20ece583
- f3cbf6c69167d759fbb7587cc7621bf6
- 78d23d9079d89b0af7c8ab6617eb0911
- daa611080ae3e39eb1852f3a89285725
- bd7c739965fc34aca5241efd3eab4710
- cad1dcc4ad2a00b694c341407ad8e777
- 076d30d94a2362ac6212864a01405dc2
- 48b62e843a77d027f55d63fa740f6a9c
- b0f4bc3d304884f4907e127843d11189
- 9a20c492f91287895ae49de71f479376
- ac1e5f1acff2a3256a940f4f39da98ab
- d694f46d7fc96955e5ac32ba23493fd5
- 85404c1b406cc6e61dca539cc96810d0
- daea619f6f08a98767383014a946e0fe
- 613d681fcce93b551d9ac27593afeab7
- 0c8e3d8fbcb0d3fc59ed18c2a231893c
- 03b375e4cfad96b5caa473bf037b0c1c
SHA-256
- b22ea99c132ab236e3a9bcc4d42b9038badaaa85c14edfee535e21f7d46436a1
- 69d5526530667912e2bccba1e526ed18cbb2a07f5d6c30518053182845c7a6d2
- 74eb1fc529c8d3b2cdfe9e6d6a3e2aed0f96eef33bd1a741ba77a68c611a39b4
- 6bc69e3327e646a11f9cdd44244124d661ed643453fb8da36ff92b24156b0790
- 769ec78cbae17606f2e5d7d125102d6544b3658e6ff3792bc3033b8ebab0f612
- fd2ac957f133640de52521159ae4ab0e921087afff28e66fabec70c80598274a
- 92eee523fa2746a0b7e6b3d2d3eaf0c0428901ac067410cf9ff02863ea1ea44f
- 36bcf9d9b812ca1c3e9bbc5cf0c753303c64901f1c43d8c899517860014c0a5c
- 20a58cfcef6f3cea69413ea8ebd79d03f8f9aac15783734b751bc5dda599150f
- 17d293f4b716684f71ad537cca98de00515060dd70e8dfcd0cc88823da4221be
- 9504d1a7c7ed4d2ea4b88b1ffc80f19c0efddc4c5964e6f906e70e6089764cdf
- 2eb186379ef6366aaa08bb450e71a0f8af37218f072ce3873a66db70137d0108
- e20b8eef21eb71f1fb27548ef861761c2bb6876e8a47f417e8de6e9762212b5f
- 77ae48e93cf275650d4033262628404968958033dc4baf7f97722ad86e741592
- 7ee5f2042d35a05b95d497eecb74492fe91af8bd873aa255c474c04e0f2166c9
- 3f2f47d731aad51cd28ccb44e2ff9b173c5f421b68ef10f89d16d89000bd4c58
- a6d5ff8173995ddad0defd205c64babdd8254154a82b6790c8363fdc57631f0b
- 48c77b1a750451e8c66559cfabecbf53e2bb74250e64e5fd441222ec7fd1f9db
SHA-1
- 2b62a44ab52cef0a87f115909936006d14fb0027
- c4aceff8a6cfc6ca6f83d50db5f3dae4aecd806b
- 09ab031bcbba0bdb8e33fb6e3f32ccd3715511a3
- 45656c912b5d2421b9cf76a1b6b909304124b57d
- 66461045cd4c85e90c83747a0de175c89ff5c197
- cb16449f42b6945303b47bedbb917a190059d586
- 2733df341bf64d8c977638e0a1542cb0f78a0382
- 81dd25019849d708f89e44397cc51fa2ce31a417
- 05ab38d610ce96126721160e502322e935df2409
- 1af8ad9d7fc9515edf750e298ff723fa1293d182
- 376afa85c761170a89cdfa2241498ddc8f9bea1a
- 4a6668025ef7deb9d956fd0c62854ed59d95695a
- 3b9e5ba175e4dace5c4569db977e8abac7439faf
- 37bc37452531467905c363fb33022ef0955b5270
- e2cfe9e29605d8bb89119525b51aa5e0b842d388
- 1b340601aa81eebbd94cc161dd3f301bd582e440
- 4361b91bd9d25b196e3b5b83aee3e8b5b9145a12
- 2bcf9b03608631c2cd740588dfd03543e4bd20f4
Remediation
- Block the threat indicators at their respective controls.
- Search for IOCs in your environment.
- Do not download such files from the internet without confirming their legitimacy.