ASEC (AhnLab) used the RAPIT analysis system to summarize malware activity for June 5–11, 2023, highlighting Infostealer and downloader as the top categories. Leading threats were Amadey, AgentTesla, GuLoader, Lokibot, and Formbook, with distribution largely via spam emails posing as invoices and purchase orders, and various C2 channels observed. #Amadey #AgentTesla #GuLoader #Lokibot #Formbook #SmokeLoader #LockBit #RAPIT
Keypoints
- Infostealer (44.6%) and downloader (43.9%) were the top main categories; backdoor (9.5%) and ransomware (2.0%) trailed.
- Amadey topped the list (30.4%), described as a downloader that can receive commands to download additional malware and steal credentials.
- AgentTesla ranked second (26.4%), an infostealer that leaks credentials from browsers, emails, and FTP clients, with multiple exfil channels (SMTP, Discord Webhooks, Telegram API).
- GuLoader ranked third (12.8%), a downloader that operates in memory, encodes payloads, and downloads Infostealers (Formbook, AgentTesla) and RATs (Remcos, NanoCore).
- Lokibot ranked fourth (8.8%), an infostealer targeting program information with C2 URLs often ending in fre.php.
- Formbook ranked fifth (5.4%), an infostealer that injects into legitimate processes and performs keylogging, clipboard, and form grabbing; distributed via spam with PO/invoice-like filenames.
MITRE Techniques
- [T1105] Ingress Tool Transfer – Amadey downloader receives commands from the attacker to download additional malware. ‘Amadey is a downloader that can receive commands from the attacker to download additional malware’
- [T1566.001] Phishing: Spearphishing Attachment – Most are distributed through spam emails disguised as invoices, shipment documents, and purchase orders. ‘Most are distributed through spam emails disguised as invoices, shipment documents, and purchase orders, the file names contain such words shown above (Invoice, Shipment, and P.O. – Purchase Order)’
- [T1071.001] Command and Control: Web Protocols – The malware uses C2 URLs such as those listed; ‘The confirmed C&C server URLs are as follows.’
- [T1555.003] Credentials in Web Browsers – AgentTesla leaks user credentials saved in web browsers, emails, and FTP clients. ‘It leaks user credentials saved in web browsers, emails, and FTP clients.’
- [T1041] Exfiltration Over C2 Channel – AgentTesla exfiltrates data through SMTP servers and other channels like Discord Webhooks and Telegram API. ‘The C&C information of recently collected samples is as follows.’
- [T1027] Obfuscated/Compressed Files and Information – GuLoader is downloaded in memory, encoded, not PE. ‘downloaded on memory to avoid detection, and the downloaded file is encoded, not PE’
- [T1055] Process Injection – Formbook is injected into normal processes (e.g., explorer.exe, system32). ‘As Formbook is injected into normal processes (one is a running explorer.exe and the other is in system32)’
- [T1071.001] Command and Control: Web Protocols – Lokibot C2 URLs tend to end in fre.php. ‘most Lokibot C&C server URLs tend to end in fre.php.’
- [T1056.001] Keylogging – Formbook captures keystrokes and related data (in addition to clipboard and form grabbing). ‘the malware can steal various information through keylogging, clipboard grabbing, and web browser form grabbing.’
Indicators of Compromise
- [IP address] C2/delivery endpoints – 77.91.68[.]62, 77.91.68[.]30, and 2 more addresses
- [URL] C2/download endpoints – http://77.91.68[.]62/wings/game/index.php, http://77.91.68[.]30/music/rock/index.php
- [Email] Sender/credential context – chris@marineclaimoffice[.]com, log3@forrwel[.]net
- [URL] Cloud storage/download links – hxxps://drive.google[.]com/uc?export=download&id=1BE6BAHmf3NoHDjFdwRJlJOUVWfeDM-eO, hxxps://drive.google[.]com/uc?export=download&id=1JntGzXZnkoZtzjegN4HaFkjUeolR96CA
- [URL] Additional C2/download payload URLs – hxxps://drive.google[.]com/uc?export=download&id=1K-sbxDlPJ-TxrtE_l-4l5bvddXLb5MZ3, hxxps://drive.google[.]com/uc?export=download&id=1TCu7G14PuLCh2gEmhGzMtc7xp72fyCOq
- [File name] Example spam-disguised filenames – Quotation Request.exe, Order 467589.exe
- [File name] More samples – 31883190ELECTRICAL.exe, Damages_Report.exe, RFQ#84839_A2023_TEXHONG_TAN CANG_SAMPLES_PRODUCTS.exe
Read more: https://asec.ahnlab.com/en/54260/