Asylum Ambuscade is a cybercrime group that also conducts cyberespionage campaigns, targeting SMBs, cryptocurrency traders, and government entities in Europe and Central Asia. The report details the group’s SunSeed, AHKBOT, and NODEBOT toolset, their multi-language implants, and a wide infrastructure with numerous IOCs and campaigns across 2022–2023. #AsylumAmbuscade #SunSeed #AHKBOT #NODEBOT #Follina #CVE-2022-30190 #Gamaredon #CobaltStrike #Qbot
Keypoints
- Asylum Ambuscade has been active since at least 2020, conducting both cyberespionage and crimeware campaigns.
- The group targets a broad set of victims, including government officials in Europe, Central Asia, cryptocurrency traders, and SMBs, with millions of potential victims since January 2022.
- Initial access often starts with spearphishing attachments (malicious Excel/Word documents) or Follina (CVE-2022-30190) exploits leading to a Lua-based SunSeed downloader.
- Core implants and loaders are scripted (Lua SunSeed, Tcl, VBS, Python, JavaScript) and extended with AutoHotkey plugins (AHKBOT); in 2023 a Node.js variant (NODEBOT) was developed for evasion.
- The campaign uses 404 TDS redirection chains and Google Ad redirects to deliver malicious JavaScript or loader components.
MITRE Techniques
- [T1583.003] Acquire Infrastructure: Virtual Private Server – Asylum Ambuscade rented VPS servers. ‘Asylum Ambuscade rented VPS servers.’
- [T1587.001] Develop Capabilities: Malware – Asylum Ambuscade develops custom implants in various scripting languages. ‘Asylum Ambuscade develops custom implants in various scripting languages.’
- [T1189] Drive-by Compromise – Targets were redirected via a TDS to a website delivering a malicious JavaScript file. ‘Targets were redirected via a TDS to a website delivering a malicious JavaScript file.’
- [T1566.001] Phishing: Spearphishing Attachment – Targets receive malicious Excel or Word documents. ‘Targets receive malicious Excel or Word documents.’
- [T1059.005] Command and Scripting Interpreter: Visual Basic – Asylum Ambuscade has a downloader in VBS. ‘Downloader in VBS.’
- [T1059.006] Command and Scripting Interpreter: Python – Asylum Ambuscade has a screenshotter in Python. ‘screenshotter in Python.’
- [T1059.007] Command and Scripting Interpreter: JavaScript – Asylum Ambuscade has a downloader in JavaScript (NODEBOT). ‘downloader in JavaScript (NODEBOT).’
- [T1059] Command and Scripting Interpreter – Asylum Ambuscade has downloaders in other scripting languages such as Lua, AutoHotkey, or Tcl. ‘downloaders in other scripting languages such as Lua, AutoHotkey, or Tcl.’
- [T1204.002] User Execution: Malicious File – Targets needs to manually execute the malicious document or JavaScript file. ‘Targets needs to manually execute the malicious document or JavaScript file.’
- [T1547.001] Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder – SunSeed persists via a LNK file in the startup folder. ‘SunSeed persists via a LNK file in the startup folder.’
- [T1027.010] Obfuscated Files or Information: Command Obfuscation – Downloaded JavaScript files are obfuscated with junk code. ‘Downloaded JavaScript files are obfuscated with junk code.’
- [T1555.003] Credentials from Password Stores: Credentials from Web Browsers – AHKBOT passwords plugin can steal browser credentials. ‘AHKBOT passwords plugin can steal browser credentials.’
- [T1087.002] Account Discovery: Domain Account – AHKBOT domain plugin gathers information using net group. ‘AHKBOT domain plugin gathers information using net group.’
- [T1010] Application Window Discovery – AHKBOT wndlist plugin lists the active windows. ‘wndlist plugin lists the active windows.’
- [T1482] Domain Trust Discovery – AHKBOT domain plugin gathers information using nltest. ‘nltest.’
- [T1057] Process Discovery – AHKBOT tasklist plugin lists the active processes. ‘tasklist plugin lists the active processes.’
- [T1518.001] Software Discovery: Security Software Discovery – AHKBOT hardware plugin lists security software. ‘security software discovery.’
- [T1082] System Information Discovery – AHKBOT wndlist plugin gets system information using systeminfo. ‘systeminfo.’
- [T1016] System Network Configuration Discovery – AHKBOT wndlist plugin gets network configuration information using ipconfig /all. ‘ipconfig /all.’
- [T1056.001] Input Capture: Keylogging – AHKBOT keylogon records keystrokes. ‘keylogon records keystrokes.’
- [T1115] Clipboard Data – AHKBOT keylogon monitors the clipboard. ‘Clipboard data.’
- [T1113] Screen Capture – AHKBOT deskscreen takes screenshot. ‘deskscreen takes screenshot.’
- [T1071.001] Application Layer Protocol: Web Protocols – AHKBOT and downloaders communicate with C2 server via HTTP. ‘communicates with the C&C server via HTTP.’
- [T1041] Exfiltration Over C2 Channel – Data is exfiltrated via the C&C channel. ‘Data is exfiltrated via the C&C channel.’
Indicators of Compromise
- [SHA-1] – 2B42FD41A1C8AC12221857DD2DF93164A71B95D7, D5F8ACAD643EE8E1D33D184DAEA0C8EA8E7FD6F8
- [Filename] – ass.dll, install.msi
- [Domain] – snowzet.com, namesilo.my[id]
- [IP] – 5.39.222.150, 5.44.42.27
- [URL] – http://84.32.188.96/serial_number
- [Filename] – Document_12_dec-1532825.js, AHKBOT_plugin.ahk
- [SHA-1] – 57157C5D3C1BB3EB3E86B24B1F4240C867A5E94F
- [IP] – 172.64.80.1 (namesilo.my[id] hosting), 172.64.80.1
Read more: https://www.welivesecurity.com/2023/06/08/asylum-ambuscade-crimeware-or-cyberespionage/