Rewterz Threat Alert – Espionage Campaign targeting Malaysia Government Officials
February 10, 2020Rewterz Threat Alert – CVE-2020-0022 – Google Android Bluetooth code execution
February 11, 2020Rewterz Threat Alert – Espionage Campaign targeting Malaysia Government Officials
February 10, 2020Rewterz Threat Alert – CVE-2020-0022 – Google Android Bluetooth code execution
February 11, 2020Severity
High
Analysis Summary
Cracked software is being used in a campaign to distribute multiple instances of malware that have estimated infected some half a million systems. Allegedly cracked versions of software are being used in a campaign to install malware, most of which has been stored on a public code repository platform under a number of different accounts. According to an estimation in a report from Cybereason, a half a million machines may have fallen victim to this campaign. When a victim installs one of the cracked versions of software, they are first infected with the Azorult information stealer. Next, Predator is installed and it downloads further malware from the repository which may include Evasive Monero, an XMRig dropper, STOP ransomware, the Vidar information stealer, the Amadey Trojan, and IntelRapid which is used to steal cryptocurrency. The copies of malware used in the campaign are regularly updated and are packed using Themida. Azorult gains additional layers of obfuscation through the use of the CypherIT Autoit packer.
Impact
- Information theft
- Crypto mining
- File encryption
Indicators of Compromise
SHA1
- 6867fc8f25917cddf71972062ae84cdacd6fa032
- d4c9acb0b43bd781da814185b416a1e2ee567bee
- 604915d2a84b2d7e5c7f79b22cb69b5e40fe1e11
- 5f888077693a4d8ae4759308c8da17479504a8d2
- ae43e07e4a9441b87107f1368504b0bb9b17ff71
- 632e4536e2db2404719c236dd446015c5011f78e
- 3ffdc296d09d67abe1dfd996819e9571337a3c44
- 9f83602650976a8daad1472bc3e61e499e47a016
- 0acdf3dc8cdf0335daf777d089a3540fe71879f1
- 0ae46b0b29eaa8f2c747e8bc1a4cfd1eae365aa3
- 4303886bf2849c68705605da5dc1afb806b027e0
- 5e2f7d83b38fc69daabb67ee3e57eabd3c1a65d1
- b3d1960cd1157f40a7b657dbcfcb0b1564dea897
- 8f15a8540276f348f4b005ed7f9f845dd8b77dd6
- bc6285a27f9fd9bebdd73d73304e983d793890e0
- fd85424f384d50ee9e97da451656dc79c1d4e990
- 50606144914112771ab85ce5c9c0246ebeff863e
- e4d0cd1f501ede1a36150994c19c5a7fb5068dc8
- a59b82c95cb647eec203b4d85fdad05723fe8c09
- ac837b1f817328dd305dfd8a816b7d299cea2cf3
- 977e7b8eb59354d40d2f2b90517545c317afe073
- 10747eeb6a3cce36a9e43cce17969ea4d5c10312
- b22e831e1d919f18de9e577cd18f213506c9f238
- a58e0d93ecd8e7c47af16ee2db8be572d38b26e9
- 2a03d33f991500caa4cbe1994c9f140f669da029
- 83678894e33be31ed7d6aa2f20fd7893f2f75d32
- ca1c80e01d3b0ca5e7386bb7fc308c8c63f1fcd8
- f2593ce87aec9c315358973de20095f69cf819cf
- af2271a14012e211645212dd5a00ea858b8c2205
- da6ae9f9add3e3f9bb14cc16566c21b9e5f0fea1
- 3c4c87024bf8922b891a419462c77cb0fe9fd7a9
- 8ae1139eb29ddffab776d5d45583d7571bae547e
- fc789f20c3a199838b3134f8eea4afd4addf86be
- f7480eba9cba7b6832748578c5b543c56affb4bd
- 5e40387fade13745d66d47a4cdfabc2a11bea124
- ff3c981cea754b943c9911db190eef423b713b29
- 97ed18de45b7e32646afb767edc99ba71f12fa9c
- da06eeefd108d27efc6ea7b579345b85c21509bd
URL
- https[:]//bitbucket[.]org/CurtisHedman/profile/repositories/
- https[:]//bitbucket[.]org/joegraham119/repo/downloads/
- https[:]//bitbucket[.]org/kevinhynes/first/downloads/
- https[:]//bitbucket[.]org/Inter577/inter/downloads
Remediation
- Block all threat indicators at your respective controls.
- Always be suspicious about emails sent by unknown senders.
- Never click on the links/attachments sent by unknown senders.