Campaign Dropping Cobalt Strike Beacons, RedLine Infostealer, and Amadey Botnet

A recent campaign drops Cobalt Strike Beacons, the RedLine Infostealer, and the Amadey Botnet with malicious scripts using two distinct methods.
Campaign Dropping Cobalt Strike Beacons, RedLine Infostealer, and Amadey Botnet

A recent campaign drops Cobalt Strike Beacons, the RedLine Infostealer, and the Amadey Botnet with malicious scripts using two distinct methods.

Context

On September 28, 2022, Talos security researchers reported a campaign delivering Cobalt Strike beacons, the RedLine Infostealer, and Amadey botnet executables active since at least August 2022. Cobalt Strike is by far the most prevalent payload in the campaign, and Talos researchers assess that the beacons are intended for future use. The campaign leverages a multistage and modular infection chain using file-less malicious scripts. As of this writing, there is no available information on the targets of the campaign or the threat actors operating the campaign.

Community Impact

All three payloads dropped in the campaign (Cobal Strike, RedLine, and Amadey) are known threats to the retail, hospitality, and travel sectors.

Technical Details

Talos researchers note that the campaign uses phishing lures with malicious Word document attachments impersonating government organizations in the U.S. and a trade union in New Zealand. The malicious Word documents attempt to exploit CVE-2017-0199, a remote code execution issue in Microsoft Office.

Talos researchers reported two attack methodologies in the campaign:

  1. The downloaded DOTM template executes an embedded malicious Visual Basic script, which leads to the generation and execution of other obfuscated VB and PowerShell scripts
  2. The malicious VB downloads and runs a Windows executable that executes malicious PowerShell commands to download and implant the payload.

Mitigation and Detection Options

Talos researchers provided the following ClamAV detection signatures:

  • Win[.]Packed[.]Generic-9956955-0
  • Win[.]Malware[.]CobaltStrike-9968593-1
  • Win[.]Dropper[.]AgentTesla-9969002-0
  • Win[.]Dropper[.]Swisyn-9969191-0
  • Win[.]Trojan[.]Swisyn-9969193-0
  • Win[.]Malware[.]RedlineStealer-9970633-0

IOCs

Talos researchers provided the following indicators of compromise (IOCs):

Indicator Type Notes
185[.]225[.]73[.]238 IP Address C2 Server
43[.]154[.]175[.]230 IP Address C2 Server
https[://]bitbucket[.]org/atlasover/atlassiancore/downloads/EmmaJardi[.]dotm Domain Stage 1 Malicious File Download
https[://]bitbucket[.]org/atlasover/atlassiancore/downloads/newmodeler[.]dll Domain Stage 5 PowerShell Downloader
https[://]bitbucket[.]org/clouchfair/oneproject/downloads/ww[.]dotm Domain Stage 1 Malicious File Download
https[://]bitbucket[.]org/clouchfair/oneproject/downloads/strymon[.]png Domain Stage 4 Payload Downloader
6d9c595c51eb561ce0e7dc6594fc60702371d5e1ac97c4c1255def8e4084ef08 SHA256
15fdad64484543b204ca76537542b6cf42b4b6fb9856692c8bf691648d647d88 SHA256
72be84fe73565209958183176cb9abd44d8e6d862f234105ed5673c171de5991 SHA256
718e55af05f48101eac7fb07767dba56a26651f8ed14f1c88058e1902d3d9dd5 SHA256
abafb5ae3f8d730acd06389320353631cbe5bc02064561851468301aa0ee9ce1 SHA256
d7c23a85bbd337bdeba63ce50cd64fa56bd08ca5631b29211e0446c77eb69f9e SHA256
fa53323173c272fee9626adffdb7d4336b299316b5dd9115fdb8674b94384d89 SHA256
c6a948be6c714e8dcce8f0fc9c2dce8b3d1f22fee9246089dbbbe1046aed8c03 SHA256
0be8a6ef98747e0efd13917d93bf0999b728588b29f4e24d3ee23e26314a1a1a SHA256
254f866241e09be7d4d7490ce9c6347ed2c671d0eac4f9d3c67155c37de3af07 SHA256
ec1e1d45162b92fbe2811c16da830186a558d4cd8af52620f37c440bbd763013 SHA256
5f344c80096e18a98b6acd77482886f402cfbccb90d922d03aac07d1ae6261af SHA256

More Recent Blog Posts