A
curious
case
of
a
threat
actor
at
the
border
between
crimeware
and
cyberespionage
Asylum
Ambuscade
is
a
cybercrime
group
that
has
been
performing
cyberespionage
operations
on
the
side.
They
were
first
publicly
outed
in
March
2022
by
Proofpoint
researchers
after
the
group
targeted
European
government
staff
involved
in
helping
Ukrainian
refugees,
just
a
few
weeks
after
the
start
of
the
Russia-Ukraine
war.
In
this
blogpost,
we
provide
details
about
the
early
2022
espionage
campaign
and
about
multiple
cybercrime
campaigns
in
2022
and
2023.
Key
points
of
this
blogpost:
-
Asylum
Ambuscade
has
been
operating
since
at
least
2020. -
It
is
a
crimeware
group
that
targets
bank
customers
and
cryptocurrency
traders
in
various
regions,
including
North
America
and
Europe. -
Asylum
Ambuscade
also
does
espionage
against
government
entities
in
Europe
and
Central
Asia. -
Most
of
the
group’s
implants
are
developed
in
script
languages
such
as
AutoHotkey,
JavaScript,
Lua,
Python,
and
VBS.
Cyberespionage
campaigns
Asylum
Ambuscade
has
been
running
cyberespionage
campaigns
since
at
least
2020.
We
found
previous
compromises
of
government
officials
and
employees
of
state-owned
companies
in
Central
Asia
countries
and
Armenia.
In
2022,
and
as
highlighted
in
the
Proofpoint
publication,
the
group
targeted
government
officials
in
several
European
countries
bordering
Ukraine.
We
assess
that
the
goal
of
the
attackers
was
to
steal
confidential
information
and
webmail
credentials
from
official
government
webmail
portals.
The
compromise
chain
starts
with
a
spearphishing
email
that
has
a
malicious
Excel
spreadsheet
attachment.
Malicious
VBA
code
therein
downloads
an
MSI
package
from
a
remote
server
and
installs
SunSeed,
a
downloader
written
in
Lua.
Note
that
we
observed
some
variations
in
the
attachments.
In
June
2022,
the
group
used
an
exploit
of
the
Follina
vulnerability
(CVE-2022-30190)
instead
of
malicious
VBA
code.
This
document
is
shown
in
Figure
1.
It
is
written
in
Ukrainian
and
the
decoy
is
about
a
security
alert
regarding
a
Gamaredon
(another
well-known
espionage
group)
attack
in
Ukraine.
Then,
if
the
machine
is
deemed
interesting,
the
attackers
deploy
the
next
stage:
AHKBOT.
This
is
a
downloader
written
in
AutoHotkey
that
can
be
extended
with
plugins,
also
written
in
AutoHotkey,
in
order
to
spy
on
the
victim’s
machine.
An
analysis
of
the
group’s
toolset
is
provided
later
in
the
blogpost.
Cybercrime
campaigns
Even
though
the
group
came
into
the
spotlight
because
of
its
cyberespionage
operations,
it
has
been
mostly
running
cybercrime
campaigns
since
early
2020.
Since
January
2022,
we
have
counted
more
than
4,500
victims
worldwide.
While
most
of
them
are
located
in
North
America,
as
shown
in
Figure
2,
it
should
be
noted
that
we
have
also
seen
victims
in
Asia,
Africa,
Europe,
and
South
America.
The
targeting
is
very
wide
and
mostly
includes
individuals,
cryptocurrency
traders,
and
small
and
medium
businesses
(SMBs)
in
various
verticals.
While
the
goal
of
targeting
cryptocurrency
traders
is
quite
obvious
–
stealing
cryptocurrency
–
we
don’t
know
for
sure
how
Asylum
Ambuscade
monetizes
its
access
to
SMBs.
It
is
possible
the
group
sells
the
access
to
other
crimeware
groups
who
might,
for
example,
deploy
ransomware.
We
have
not
observed
this
in
our
telemetry,
though.
Asylum
Ambuscade’s
crimeware
compromise
chain
is,
overall,
very
similar
to
the
one
we
describe
for
the
cyberespionage
campaigns.
The
main
difference
is
the
compromise
vector,
which
can
be:
-
A
malicious
Google
Ad
redirecting
to
a
website
delivering
a
malicious
JavaScript
file
(as
highlighted
in
this
SANS
blogpost) -
Multiple
HTTP
redirections
in
a
Traffic
Direction
System
(TDS).
The
TDS
used
by
the
group
is
referred
to
as
404
TDS
by
Proofpoint.
It
is
not
exclusive
to
Asylum
Ambuscade
and
we
observed
it
was,
for
example,
used
by
another
threat
actor
to
deliver
Qbot.
An
example
of
a
redirection
chain,
captured
by
io,
is
shown
in
Figure
3.
In
addition
to
the
different
compromise
vector,
the
group
developed
SunSeed
equivalents
in
other
scripting
languages
such
as
Tcl
and
VBS.
In
March
2023,
it
developed
an
AHKBOT
equivalent
in
Node.js
that
we
named
NODEBOT.
We
believe
those
changes
were
intended
to
bypass
detections
from
security
products.
An
overview
of
the
compromise
chain
is
provided
in
Figure
4.
Attribution
We
believe
that
the
cyberespionage
and
cybercrime
campaigns
are
operated
by
the
same
group.
-
The
compromise
chains
are
almost
identical
in
all
campaigns.
In
particular,
SunSeed
and
AHKBOT
have
been
widely
used
for
both
cybercrime
and
cyberespionage. -
We
don’t
believe
that
SunSeed
and
AHKBOT
are
sold
on
the
underground
market.
These
tools
are
not
very
sophisticated
in
comparison
to
other
crimeware
tools
for
sale,
the
number
of
victims
is
quite
low
were
it
a
toolset
shared
among
multiple
groups,
and
the
network
infrastructure
is
consistent
across
campaigns.
As
such,
we
believe
that
Asylum
Ambuscade
is
a
cybercrime
group
that
is
doing
some
cyberespionage
on
the
side.
We
also
believe
that
these
three
articles
describe
incidents
related
to
the
group:
Toolset
Malicious
JavaScript
files
In
most
crimeware
campaigns
run
by
the
group,
the
compromise
vector
is
not
a
malicious
document,
but
a
JavaScript
file
downloaded
from
the
previously
documented
TDS.
Note
that
it
has
to
be
manually
executed
by
the
victim,
so
the
attackers
are
trying
to
entice
people
into
clicking
on
the
files
by
using
filenames
such
as
Document_12_dec-1532825.js,
TeamViewer_Setup.js,
or
AnyDeskInstall.js.
Those
scripts
are
obfuscated
using
random
variable
names
and
junk
code,
most
likely
intended
to
bypass
detections.
An
example
is
provided
in
Figure
5.
Once
deobfuscated,
this
script
can
be
summarized
in
two
lines:
|
First-stage
downloaders
The
first
stage
downloaders
are
dropped
by
an
MSI
package
downloaded
by
either
a
malicious
document
or
a
JavaScript
file.
There
are
three
versions
of
this
downloader:
-
Lua
(SunSeed) - Tcl
- VBS
SunSeed
is
a
downloader
written
in
the
Lua
language
and
heavily
obfuscated,
as
shown
in
Figure
6.
Once
manually
deobfuscated,
the
main
function
of
the
script
looks
like
this:
1 2 3 4 5 6 |
|
It
gets
the
serial
number
of
the
C:
drive
and
sends
a
GET
request
to
http://<C&C>/<serial_number>
using
the
User-Agent
LuaSocket
2.0.2.
It
then
tries
to
execute
the
reply.
This
means
that
SunSeed
expects
to
receive
additional
Lua
scripts
from
the
C&C
server.
We
found
two
of
those
scripts:
install
and
move.
install
is
a
simple
Lua
script
that
downloads
an
AutoHotkey
script
into
C:ProgramDatamscoree.ahk
and
the
legitimate
AutoHotkey
interpreter
into
C:ProgramDatamscoree.exe,
as
shown
in
Figure
7.
This
AutoHotkey
script
is
AHKBOT,
the
second
stage
downloader.
An
even
simpler
Lua
script,
move,
is
shown
in
Figure
8.
It
is
used
to
reassign
management
of
a
victimized
computer
from
one
C&C
server
to
another.
It
is
not
possible
to
update
the
hardcoded
SunSeed
C&C
server;
to
complete
a
C&C
reassignment,
a
new
MSI
installer
needs
to
be
downloaded
and
executed,
exactly
as
when
the
machine
was
first
compromised.
As
mentioned
above,
we
found
another
variant
of
SunSeed
developed
using
the
Tcl
language
instead
of
Lua,
as
shown
in
Figure
9.
The
main
difference
is
that
it
doesn’t
send
the
C:
drive’s
serial
number
in
the
GET
request.
The
third
variant
was
developed
in
VBS,
as
shown
in
Figure
10.
The
main
difference
is
that
it
doesn’t
download
and
interpret
additional
code,
but
downloads
and
executes
an
MSI
package.
Second-stage
downloaders
The
main
second-stage
downloader
is
AHKBOT,
developed
in
AutoHotkey.
As
shown
in
Figure
11,
it
sends
a
GET
request,
with
the
User-Agent
AutoHotkey
(the
default
value
used
by
AutoHotkey),
to
http://<C&C>/<serial_number_of_C_drive>-RP,
almost
exactly
as
the
earlier
SunSeed.
RP
might
be
a
campaign
identifier,
as
it
changes
from
sample
to
sample.
AHKBOT
can
be
found
on
disk
at
various
locations,
such
as
C:ProgramDatamscoree.ahk
or
C:ProgramDataadb.ahk.
It
downloads
and
interprets
spy
plugins,
also
developed
in
AutoHotkey.
A
summary
of
the
21
plugins
is
provided
in
Table
1.
Table
1.
SunSeed
plugins
Plugin name |
Description |
---|---|
ass |
Download and execute a Cobalt Strike loader packed with VMProtect. The beacon’s configuration extracted using the tool CobaltStrikeParser is provided in the IoCs in the Cobalt Strike configuration section. |
connect |
Send the log message connected! to the C&C server. |
deletecookies |
Download SQLite from /download?path=sqlite3slashsqlite3dotdll via HTTP from its C&C server, then delete browser cookies for the domains td.com (a Canadian bank) and mail.ru. We don’t know why the attackers need to delete cookies, especially for these domains. It’s possible it is intended to delete session cookies to force its victims to reenter their credentials that would then be captured by the keylogger. |
deskscreen |
Take a screenshot using Gdip.BitmapFromScreen and send it to the C&C server. |
deskscreenon |
Similar to deskscreen but take screenshots in a 15-second loop. |
deskscreenoff |
Stop the deskscreenon loop. |
domain |
Gather information about the Active Directory using the following commands: · cmd /c chcp 65001 && net group “domain admins” /domain · cmd /c chcp 65001 && net group “enterprise admins” /domain · cmd /c chcp 65001 && net group “”Domain Computers”” /domain · cmd /c chcp 65001 && nltest /dclist: · cmd /c chcp 65001 && nltest /DOMAIN_TRUSTS · cmd /c chcp 65001 && ipconfig /all · cmd /c chcp 65001 && systeminfo |
hardware |
Get victim’s host information using WMI queries: · Select * from Win32_OperatingSystem · SELECT * FROM Win32_LogicalDisk · SELECT * FROM Win32_Processor · Select * from Win32_OperatingSystem · SELECT * FROM Win32_VideoController · Select * from Win32_NetworkAdapterConfiguration WHERE IPEnabled = True · Select * from FirewallProduct · Select * from AntiSpywareProduct · Select * from AntiVirusProduct · SELECT * FROM Win32_Product · SELECT Caption,ExecutablePath,ProcessID FROM Win32_Process where ExecutablePath is not null and send to the C&C server. |
hvncon |
Download and execute a custom hVNC (hidden VNC) application from http://<C&C>/download?path=hvncslashhvncdotzip |
hvncoff |
Stop the hVNC by executing taskkill /f /im hvnc.exe. |
installchrome |
Download http:///download?path=chromeslashchromedotzip, a legitimate copy of Chrome, and unpack it into %LocalAppData%Google‌ChromeApplication. This copy of Chrome is likely used by hVNC if the victim doesn’t have Chrome installed. |
keylogon |
Start the keylogger, hooked input using DllCall(“SetWindowsHookEx”, […]). The keystrokes are sent to the C&C server when the active application changes. |
keylogoff |
Stop the keylogger. |
passwords |
Steal passwords from Internet Explorer, Firefox, and Chromium-based browsers. It downloads SQLite to read the browser storages. It can also decrypt locally encrypted passwords by calling the Microsoft CryptUnprotectData function. Stolen passwords are sent to the C&C server. This |
rutservon |
Download a remote access trojan (RAT) from http://<C&C>/‌download?path=rutservslashagent6dot10dotexe (SHA-1: 3AA8A4554B175DB9DA5EEB7824B5C047638A6A9D). This is a commercial RAT developed by Remote Utilities LLC that provides full control over the machine on which it is installed. |
rutservoff |
Kill the RAT. |
steal |
Download and execute an infostealer – probably based on Rhadamanthys. |
tasklist |
List running processes by using the WMI query Select * from Win32_Process. |
towake |
Move the mouse using MouseMove, 100, 100. This is likely to prevent the computer from going to sleep, especially given the name of the plugin. |
update |
Download a new version of SunSeed AutoHotkey from the C&C server and replace the current SunSeed on disk. The AutoHotkey interpreter is located in C:ProgramDataadb.exe. |
wndlist |
List active windows by calling WinGet windows, List (Autohotkey syntax). |
The
plugins
send
the
result
back
to
the
C&C
server
using
a
log
function,
as
shown
in
Figure
12.
In
March
2023,
the
attackers
developed
a
variant
of
AHKBOT
in
Node.js
that
we
have
named
NODEBOT
–
see
Figure
13.
The
attackers
also
rewrote
some
AHKBOT
plugins
in
JavaScript
to
make
them
compatible
with
NODEBOT.
So
far,
we
have
observed
the
following
plugins
(an
asterisk
indicates
that
the
plugin
is
new
to
NODEBOT):
-
connect -
deskscreen -
hardware -
hcmdon
(a
reverse
shell
in
Node.js)* -
hvncoff -
hvncon -
keylogoff -
keylogon
(download
and
execute
the
AutoHotkey
keylogger) -
mods
(download
and
install
hVNC)* -
passwords -
screen
Conclusion
Asylum
Ambuscade
is
a
cybercrime
group
mostly
targeting
SMBs
and
individuals
in
North
America
and
Europe.
However,
it
appears
to
be
branching
out,
running
some
recent
cyberespionage
campaigns
on
the
side,
against
governments
in
Central
Asia
and
Europe
from
time
to
time.
It
is
quite
unusual
to
catch
a
cybercrime
group
running
dedicated
cyberespionage
operations,
and
as
such
we
believe
that
researchers
should
keep
close
track
of
Asylum
Ambuscade
activities.
ESET
Research
offers
private
APT
intelligence
reports
and
data
feeds.
For
any
inquiries
about
this
service,
visit
the ESET
Threat
Intelligence page.
IoCs
Files
SHA-1 | Filename |
ESET detection name |
Description |
---|---|---|---|
2B42FD41A1C8AC12221857DD2DF93164A71B95D7 |
ass.dll |
Win64/Packed.VMProtect.OX |
Cobalt Strike loader. |
D5F8ACAD643EE8E1D33D184DAEA0C8EA8E7FD6F8 |
M_suri antiinfla_ioniste Polonia.doc |
DOC/TrojanDownloader.Agent.AAP |
Document exploiting the Follina vulnerability. |
57157C5D3C1BB3EB3E86B24B1F4240C867A5E94F |
N/A | Win32/TrojanDownloader.AutoHK.KH | AHKBOT. |
7DB446B95D5198330B2B25E4BA6429C57942CFC9 |
N/A | VBS/Agent.QOF |
Python screenshotter. |
5F67279C195F5E8A35A24CBEA76E25BAD6AB6E8E |
N/A | VBS/TrojanDownloader.Agent.YDQ |
VBS downloader. |
C98061592DE61E34DA280AB179465580947890DE |
install.msi |
JS/Agent.QRI | NODEBOT. |
519E388182DE055902C656B2D95CCF265A96CEAB |
Document_12_dec-1532825.js |
JS/TrojanDownloader.Agent.ZJM |
Malicious JavaScript file distributed via the TDS. |
AC3AFD14AD1AEA9E77A84C84022B4022DF1FC88B |
ahk |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
64F5AC9F0C6C12F2A48A1CB941847B0662734FBF |
ass |
Win32/TrojanDownloader.AHK.N |
AHKBOT plugin. |
557C5150A44F607EC4E7F4D0C0ED8EE6E9D12ADF |
connect |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
F85B82805C6204F34DB0858E2F04DA9F620A0277 |
deletecookies |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
5492061DE582E71B2A5DA046536D4150F6F497F1 |
deskscreen |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
C554100C15ED3617EBFAAB00C983CED5FEC5DB11 |
deskscreenoff |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
AD8143DE4FC609608D8925478FD8EA3CD9A37C5D |
deskscreenon |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
F2948C27F044FC6FB4849332657801F78C0F7D5E |
domain |
Win32/TrojanDownloader.AutoHK.KH |
AHKBOT plugin. |
7AA23E871E796F89C465537E6ECE962412CDA636 |
hardware |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
384961E19624437EB4EB22B1BF45953D7147FB8F |
hvncoff |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
7FDB9A73B3F13DBD94D392132D896A5328DACA59 |
hvncon |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
3E38D54CC55A48A3377A7E6A0800B09F2E281978 |
installchrome |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
7F8742778FC848A6FBCFFEC9011B477402544171 |
keylogoff |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
29604997030752919EA42B6D6CEE8D3AE28F527E |
keylogon |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
7A78AF75841C2A8D8A5929C214F08EB92739E9CB |
passwords |
Win32/Spy.AHK.AB |
AHKBOT plugin. |
441369397D0F8DB755282739A05CB4CF52113C40 |
rutservoff |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
117ECFA95BE19D5CF135A27AED786C98EC8CE50B |
rutservon |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
D24A9C8A57C08D668F7D4A5B96FB7B5BA89D74C3 |
steal |
Win32/Spy.AHK.AE |
AHKBOT plugin. |
95EDC096000C5B8DA7C8F93867F736928EA32575 |
towake |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
62FA77DAEF21772D599F2DC17DBBA0906B51F2D9 |
update |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
A9E3ACFE029E3A80372C0BB6B7C500531D09EDBE |
wndlist |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
EE1CFEDD75CBA9028904C759740725E855AA46B5 |
tasklist |
Win32/Spy.AHK.AD |
AHKBOT plugin. |
Network
IP | Domain |
Hosting provider |
First seen |
Details |
---|---|---|---|---|
5.39.222[.]150 |
N/A |
Hostkey_NL abuse, ORG-HB14-RIPE |
February 27, 2022 |
C&C server. |
5.44.42[.]27 |
snowzet[.]com |
GLOBAL INTERNET SOLUTIONS LLC |
December 7, 2022 |
Cobalt Strike C&C server. |
5.230.68[.]137 |
N/A |
GHOSTnet GmbH |
September 5, 2022 |
C&C server. |
5.230.71[.]166 |
N/A |
GHOSTnet GmbH |
August 17, 2022 |
C&C server. |
5.230.72[.]38 |
N/A |
GHOSTnet GmbH |
September 24, 2022 |
C&C server. |
5.230.72[.]148 |
N/A |
GHOSTnet GmbH |
September 26, 2022 |
C&C server. |
5.230.73[.]57 |
N/A |
GHOSTnet GmbH |
August 9, 2022 |
C&C server. |
5.230.73[.]63 |
N/A |
GHOSTnet GmbH |
June 2, 2022 |
C&C server. |
5.230.73[.]241 |
N/A |
GHOSTnet GmbH |
August 20, 2022 |
C&C server. |
5.230.73[.]247 |
N/A |
GHOSTnet GmbH |
August 9, 2022 |
C&C server. |
5.230.73[.]248 |
N/A |
GHOSTnet GmbH |
June 1, 2022 |
C&C server. |
5.230.73[.]250 |
N/A |
GHOSTnet GmbH |
June 2, 2022 |
C&C server. |
5.252.118[.]132 |
N/A | aezagroup |
March 1, 2023 |
C&C server. |
5.252.118[.]204 |
N/A | aezagroup |
March 1, 2023 |
C&C server. |
5.255.88[.]222 |
N/A | Serverius |
May 28, 2022 |
C&C server. |
23.106.123[.]119 |
N/A | IRT-LSW-SG |
February 4, 2022 |
C&C server. |
31.192.105[.]28 |
N/A |
HOSTKEY B.V. |
February 23, 2022 |
C&C server. |
45.76.211[.]131 |
N/A |
The Constant Company, LLC |
January 19, 2023 |
C&C server. |
45.77.185[.]151 |
N/A |
Vultr Holdings, LLC |
December 16, 2022 |
C&C server. |
45.132.1[.]238 |
N/A |
Miglovets Egor Andreevich |
November 7, 2022 |
C&C server. |
45.147.229[.]20 |
N/A | COMBAHTON |
January 22, 2022 |
C&C server. |
46.17.98[.]190 |
N/A |
Hostkey_NL abuse, ORG-HB14-RIPE |
August 31, 2020 |
C&C server. |
46.151.24[.]197 |
N/A |
Hosting technology LTD |
January 1, 2023 |
C&C server. |
46.151.24[.]226 |
N/A |
Hosting technology LTD |
December 23, 2022 |
C&C server. |
46.151.25[.]15 |
N/A |
Hosting technology LTD |
December 27, 2022 |
C&C server. |
46.151.25[.]49 |
N/A |
Podolsk Electrosvyaz Ltd. |
December 29, 2022 |
C&C server. |
46.151.28[.]18 |
N/A |
Hosting technology LTD |
January 1, 2023 |
C&C server. |
51.83.182[.]153 |
N/A | OVH |
March 8, 2022 |
C&C server. |
51.83.189[.]185 |
N/A | OVH |
March 5, 2022 |
C&C server. |
62.84.99[.]195 |
N/A | VDSINA-NL |
March 27, 2023 |
C&C server. |
62.204.41[.]171 |
N/A | HORIZONMSK-AS |
December 12, 2022 |
C&C server. |
77.83.197[.]138 |
N/A | HZ-UK-AS |
March 7, 2022 |
C&C server. |
79.137.196[.]121 |
N/A |
AEZA GROUP Ltd |
March 1, 2023 |
C&C server. |
79.137.197[.]187 |
N/A | aezagroup |
December 1, 2022 |
C&C server. |
80.66.88[.]155 |
N/A |
XHOST INTERNET SOLUTIONS LP |
February 24, 2022 |
C&C server. |
84.32.188[.]29 |
N/A |
UAB Cherry Servers |
January 10, 2022 |
C&C server. |
84.32.188[.]96 |
N/A |
UAB Cherry Servers |
January 29, 2022 |
C&C server. |
85.192.49[.]106 |
N/A |
Hosting technology LTD |
December 25, 2022 |
C&C server. |
85.192.63[.]13 |
N/A |
AEZA GROUP Ltd |
December 27, 2022 |
C&C server. |
85.192.63[.]126 |
N/A | aezagroup |
March 5, 2023 |
C&C server. |
85.239.60[.]40 |
N/A | Clouvider |
April 30, 2022 |
C&C server. |
88.210.10[.]62 |
N/A |
Hosting technology LTD |
December 12, 2022 |
C&C server. |
89.41.182[.]94 |
N/A |
Abuse-C Role, ORG-HS136-RIPE |
September 3, 2021 |
C&C server. |
89.107.10[.]7 |
N/A |
Miglovets Egor Andreevich |
December 4, 2022 |
C&C server. |
89.208.105[.]255 |
N/A |
AEZA GROUP Ltd |
December 22, 2022 |
C&C server. |
91.245.253[.]112 |
N/A |
M247 Europe |
March 4, 2022 |
C&C server. |
94.103.83[.]46 |
N/A |
Hosting technology LTD |
December 11, 2022 |
C&C server. |
94.140.114[.]133 |
N/A | NANO-AS |
March 8, 2022 |
C&C server. |
94.140.114[.]230 |
N/A | NANO-AS |
April 13, 2022 |
C&C server. |
94.140.115[.]44 |
N/A | NANO-AS |
April 1, 2022 |
C&C server. |
94.232.41[.]96 |
N/A |
XHOST INTERNET SOLUTIONS LP |
October 2, 2022 |
C&C server. |
94.232.41[.]108 |
N/A |
XHOST INTERNET SOLUTIONS LP |
August 19, 2022 |
C&C server. |
94.232.43[.]214 |
N/A | XHOST-INTERNET-SOLUTIONS |
October 10, 2022 |
C&C server. |
98.142.251[.]26 |
N/A |
BlueVPS OU |
April 29, 2022 |
C&C server. |
98.142.251[.]226 |
N/A |
BlueVPS OU |
April 12, 2022 |
C&C server. |
104.234.118[.]163 |
N/A |
IPXO LLC |
March 1, 2023 |
C&C server. |
104.248.149[.]122 |
N/A |
DigitalOcean, LLC |
December 11, 2022 |
C&C server. |
109.107.173[.]72 |
N/A |
Hosting technology LTD |
January 20, 2023 |
C&C server. |
116.203.252[.]67 |
N/A |
Hetzner Online GmbH – Contact Role, ORG-HOA1-RIPE |
March 5, 2022 |
C&C server. |
128.199.82[.]141 |
N/A |
Digital Ocean |
December 11, 2022 |
C&C server. |
139.162.116[.]148 |
N/A |
Akamai Connected Cloud |
March 3, 2022 |
C&C server. |
141.105.64[.]121 |
N/A |
HOSTKEY B.V. |
March 21, 2022 |
C&C server. |
146.0.77[.]15 |
N/A | Hostkey_NL |
April 10, 2022 |
C&C server. |
146.70.79[.]117 |
N/A |
M247 Ltd |
March 2, 2022 |
C&C server. |
157.254.194[.]225 |
N/A |
Tier.Net Technologies LLC |
March 1, 2023 |
C&C server. |
157.254.194[.]238 |
N/A |
Tier.Net Technologies LLC |
March 13, 2023 |
C&C server. |
172.64.80[.]1 |
namesilo.my[.]id |
Cloudflare, Inc. |
December 14, 2022 |
C&C server. |
172.86.75[.]49 |
N/A |
BL Networks |
May 17, 2021 |
C&C server. |
172.104.94[.]104 |
N/A | Linode |
March 5, 2022 |
C&C server. |
172.105.235[.]94 |
N/A | Linode |
April 5, 2022 |
C&C server. |
172.105.253[.]139 |
N/A |
Akamai Connected Cloud |
March 3, 2022 |
C&C server. |
176.124.214[.]229 |
N/A | VDSINA-NL |
December 26, 2022 |
C&C server. |
176.124.217[.]20 |
N/A |
Hosting technology LTD |
March 2, 2023 |
C&C server. |
185.70.184[.]44 |
N/A | Hostkey_NL |
April 12, 2021 |
C&C server. |
185.82.126[.]133 |
N/A |
Sia Nano IT |
March 12, 2022 |
C&C server. |
185.123.53[.]49 |
N/A | BV-EU-AS |
March 14, 2022 |
C&C server. |
185.150.117[.]122 |
N/A |
UAB Cherry Servers |
April 2, 2021 |
C&C server. |
185.163.45[.]221 |
N/A |
MivoCloud SRL |
January 2, 2023 |
C&C server. |
193.109.69[.]52 |
N/A | Hostkey_NL |
November 5, 2021 |
C&C server. |
193.142.59[.]152 |
N/A |
HostShield LTD Admin |
November 17, 2022 |
C&C server. |
193.142.59[.]169 |
N/A |
ColocationX Ltd. |
November 8, 2022 |
C&C server. |
194.180.174[.]51 |
N/A |
MivoCloud SRL |
December 24, 2022 |
C&C server. |
195.2.81[.]70 |
N/A |
Hosting technology LTD |
September 27, 2022 |
C&C server. |
195.133.196[.]230 |
N/A |
JSC Mediasoft ekspert |
July 15, 2022 |
C&C server. |
212.113.106[.]27 |
N/A |
AEZA GROUP Ltd |
January 28, 2023 |
C&C server. |
212.113.116[.]147 |
N/A |
JY Mobile Communications |
March 1, 2023 |
C&C server. |
212.118.43[.]231 |
N/A |
Hosting technology LTD |
March 1, 2023 |
C&C server. |
213.109.192[.]230 |
N/A | BV-EU-AS |
June 1, 2022 |
C&C server. |
Cobalt
Strike
configuration
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 |
BeaconType                     Â
Port                           Â
SleepTime                        –
MaxGetSize                     Â
Jitter                         Â
MaxDNSÂ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â
PublicKey_MD5Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â –
C2Server                       Â
UserAgent                        –
HttpPostUri                      –
Malleable_C2_Instructions        –
                                 Â
                                 Â
                                 Â
                                 Â
HttpGet_Metadata               Â
                                 Â
                                 Â
                                 Â
                                 Â
                                 Â
                                 Â
                                 Â
HttpPost_Metadata                –
                                 Â
                                 Â
                                 Â
                                 Â
                                 Â
                                 Â
                                 Â
                                 Â
                                 Â
                                 Â
                                 Â
PipeName                       Â
DNS_Idle                       Â
DNS_Sleep                        –
SSH_Host                       Â
SSH_Port                       Â
SSH_Username                   Â
SSH_Password_Plaintext         Â
SSH_Password_Pubkey              –
SSH_Banner                     Â
HttpGet_Verb                   Â
HttpPost_Verb                    –
HttpPostChunk                    –
Spawnto_x86Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â –
Spawnto_x64Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â –
CryptoScheme                   Â
Proxy_Config                   Â
Proxy_User                     Â
Proxy_Password                 Â
Proxy_Behavior                 Â
Watermark                        –
bStageCleanup                    –
bCFGCaution                      –
KillDate                       Â
bProcInject_StartRWXÂ Â Â Â Â Â Â Â Â Â Â Â
bProcInject_UseRWXÂ Â Â Â Â Â Â Â Â Â Â Â Â Â
bProcInject_MinAllocSize       Â
ProcInject_PrependAppend_x86Â Â Â Â
                                 Â
ProcInject_PrependAppend_x64Â Â Â Â
                                 Â
ProcInject_Execute             Â
                                 Â
                                 Â
                                 Â
                                 Â
ProcInject_AllocationMethod      –
bUsesCookies                   Â
HostHeader                     Â
headersToRemove                  –
DNS_Beaconing                    –
DNS_get_TypeAÂ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â –
DNS_get_TypeAAAAÂ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â
DNS_get_TypeTXTÂ Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â Â –
DNS_put_metadata               Â
DNS_put_output                 Â
DNS_resolver                   Â
DNS_strategy                   Â
DNS_strategy_rotate_seconds      –
DNS_strategy_fail_x              –
DNS_strategy_fail_seconds        – |
MITRE
ATT&CK
techniques
This
table
was
built
using
version
13
of
the
MITRE
ATT&CK
framework.
Tactic | ID | Name | Description |
---|---|---|---|
Resource Development |
T1583.003 |
Acquire Infrastructure: Virtual Private Server |
Asylum Ambuscade rented VPS servers. |
T1587.001 |
Develop Capabilities: Malware |
Asylum Ambuscade develops custom implants in various scripting languages. |
|
Initial Access |
T1189 |
Drive-by Compromise |
Targets were redirected via a TDS to a website delivering a malicious JavaScript file. |
T1566.001 |
Phishing: Spearphishing Attachment |
Targets receive malicious Excel or Word documents. |
|
Execution |
T1059.005 |
Command and Scripting Interpreter: Visual Basic |
Asylum Ambuscade has a downloader in VBS. |
T1059.006 |
Command and Scripting Interpreter: Python |
Asylum Ambuscade has a screenshotter in Python. |
|
T1059.007 |
Command and Scripting Interpreter: JavaScript |
Asylum Ambuscade has a downloader in JavaScript (NODEBOT). |
|
T1059 |
Command and Scripting Interpreter |
Asylum Ambuscade has downloaders in other scripting languages such as Lua, AutoHotkey, or Tcl. |
|
T1204.002 |
User Execution: Malicious File |
Targets needs to manually execute the malicious document or JavaScript file. |
|
Persistence |
T1547.001 |
Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder |
SunSeed persists via a LNK file in the startup folder. |
Defense Evasion |
T1027.010 |
Obfuscated Files or Information: Command Obfuscation |
Downloaded JavaScript files are obfuscated with junk code. |
Credential Access |
T1555.003 |
Credentials from Password Stores: Credentials from Web Browsers |
AHKBOT passwords plugin can steal browser credentials. |
Discovery |
T1087.002 |
Account Discovery: Domain Account |
AHKBOT domain plugin gathers information about the domain using net group. |
T1010 |
Application Window Discovery |
AHKBOT wndlist plugin lists the active windows. |
|
T1482 |
Domain Trust Discovery |
AHKBOT domain plugin gathers information using nltest. |
|
T1057 |
Process Discovery |
AHKBOT tasklist plugin lists the active processes using Select * from Win32_Process. |
|
T1518.001 |
Software Discovery: Security Software Discovery |
AHKBOT hardware plugin lists security software using Select * from FirewallProduct, Select * from AntiSpywareProduct and Select * from AntiVirusProduct. |
|
T1082 |
System Information Discovery |
AHKBOT wndlist plugin gets system information using systeminfo. |
|
T1016 |
System Network Configuration Discovery |
AHKBOT wndlist plugin gets network configuration information using ipconfig /all. |
|
Collection |
T1056.001 |
Input Capture: Keylogging |
AHKBOT keylogon records keystrokes. |
T1115 |
Clipboard Data |
AHKBOT keylogon monitors the clipboard. |
|
T1113 |
Screen Capture |
AHKBOT deskscreen takes screenshot. |
|
Command and Control |
T1071.001 |
Application Layer Protocol: Web Protocols |
AHKBOT (and all the other downloaders) communicates with the C&C server via HTTP. |
Exfiltration |
T1041 |
Exfiltration Over C2 Channel |
Data is exfiltrated via the C&C channel. |