LokiBot Malware – Active IOCs
April 8, 2025CVE-2024-57357 – TP-Link TL-WPA 8630 Vulnerability
April 8, 2025LokiBot Malware – Active IOCs
April 8, 2025CVE-2024-57357 – TP-Link TL-WPA 8630 Vulnerability
April 8, 2025Severity
Meduim
Analysis Summary
Amadey is a botnet, a type of malicious software that infects computers and turns them into "bots" or "zombies" that can be controlled remotely by an attacker. Botnets are often used to carry out cyber attacks, such as spamming, distributed denial-of-service (DDoS) attacks, and data theft. The Amadey trojan can also download additional malware. and exfiltrate user information to a command and control (C2) server. Moreover, it can engage the victim's system. The threat actor sent spam emails that reference a package or shipment. Many of the emails claim in the subject line that the package or shipment is from the shipping company DHL. For example, “You have a package coming from DHL.” The bodies of all of the emails we observed in this campaign are blank. Each email has a ZIP attachment containing a Visual Basic Script (VBS) file. Each file name for the ZIP files is a series of numbers separated by an underscore, such as 044450_64504154.zip. The VBS files have the same name as their ZIP file, except they have the VBS extension rather than the ZIP extension.
Amadey has been observed targeting a wide range of organizations, including government agencies, financial institutions, and technology companies. The Amadey botnet is a sophisticated and flexible threat that poses a significant risk to organizations and individuals. To defend against Amadey and other botnets, it is important to keep software up to date, follow best practices for cybersecurity, and use a combination of security tools and services.
Impact
- Information Theft
- Exposure of Sensitive Data
Indicators of Compromise
MD5
2a29072e101333ceba9cf14225fb2937
5a0c7d37859d3542f6772b9ef5ee5cf8
0d397828202c894e2ef844b26e254853
f258ba9ca646b9749d7f22a3dfdc77d2
SHA-256
72b2c77bc9da721dc2b93ebccd42afeb3f692f36e5cc89c014b957859735c161
16b64046640bb6230c3bf41bdebb18224781fef9f2225bc30b82a063b1ed3fa8
d26022e6a7e6e4fc7daba48705a49845fe73acd2630d577937cde2c9948b4614
fcc3edcd526b0c746998d72af8ce9cc29b0bd801f767078cc472f93d57eee9ef
SHA-1
364c2652d65b063dfa6e9f67681f6dfa4fd66a8e
27b53f77c9f99b87c6f9b1908310a5e2d73d1a79
643c9fa847acfab19a151de57596d88be6d5fd11
36ee4ef9e49e0ebb8973c8f50849d6367c03e69b
Remediation
- Block all threat indicators at your respective controls.
- Search for indicators of compromise (IOCs) in your environment utilizing your respective security controls.
- Emails from unknown senders should always be treated with caution.
- Never trust or open links and attachments received from unknown sources/senders.