Representing the Trojan (RAT) called FlawedAmmyy

Leaked Ammyy Admin Source Code Turned into Malware

Share with your network!

Overview

Proofpoint researchers have discovered a previously undocumented remote access Trojan (RAT) called FlawedAmmyy that has been used since the beginning of 2016 in both highly targeted email attacks as well as massive, multi-million message campaigns. Narrow attacks targeted the Automotive industry among others, while the large malicious spam campaigns appear to be associated with threat actor TA505, an actor responsible for many large-scale attacks since at least 2014.

Delivery Analysis

March 5, 2018

FlawedAmmyy Admin appeared most recently as the payload in massive email campaigns on March 5 and 6, 2018. The messages in these campaigns contained zipped .url attachments and both the messages and the delivery suggest they were sent by threat actor TA505, known for sending  large-scale Dridex, Locky, and GlobeImposter campaigns, among others, over the last four years.

For example, on March 5, the messages were sent from addresses spoofing the recipient’s own domain with subjects such as “Receipt No 1234567” (random digits, and first word could also be “Bill” or “Invoice”) and matching attachments "Receipt 1234567.zip". The attachments were ZIP archives containing ".url" files with names such as "B123456789012.url". Again, these were apparently random digits (Figure 1).

Sample email from the Ammyy Admin malware campaign

Figure 1: Sample email from March 5, 2018, Ammyy Admin malware campaign

Contents of the .url file from the Ammy Admin malware download

Figure 2: Contents of the .url file

The .url files are interpreted by Microsoft Windows as “Internet Shortcut” files [1], examples of which can be found in the “Favorites” folder on Windows operating systems. This type of file can be created manually [2]; they are intended to serve as links to internet sites, launching the default  browser automatically. However, in this case the attacker specified the URL to be a “file://” network share instead of the typical http:// link. As a result, the system downloads and executes a JavaScript file over the SMB protocol rather than launching a web browser if the user clicks “Open” on the warning dialog shown in Figure 3.

`Warning dialog displayed after double-clicking the .url file

Figure 3: Warning dialog displayed after double-clicking the .url file

This JavaScript in turn downloads Quant Loader, which, in this case, fetched the FlawedAmmyy RAT as the final payload. The use of “.url” files and SMB protocol downloads is unusual, and this is the first time we have seen these methods combined.

March 1, 2018

The FlawedAmmyy RAT previously appeared on March 1 in a narrowly targeted attack. Emails contained an attachment 0103_022.doc (Figure 4), which used macros to download the FlawedAmmyy malware directly. This sample used the same command and control (C&C) address as the sample from the massive campaign on March 5.

Screenshot of the attachment from the Ammyy Admin malware campaign

Figure 4: Screenshot of the document attachment from March 1, 2018, FlawedAmmyy campaign

January 16, 2018

We also observed this RAT in a narrowly targeted attack that included the automotive industry. Emails contained the attachment 16.01.2018.doc which used macros to download the FlawedAmmyy RAT directly.

Malware Analysis

FlawedAmmyy is based on leaked source code for Version 3 of the Ammyy Admin remote desktop software. As such FlawedAmmyy contains the functionality of the leaked version, including:

  • Remote Desktop control
  • File system manager
  • Proxy support
  • Audio Chat

Strings with references to the leaked Ammyy Admin Version 3

Figure 5: Strings from the analyzed January 16 sample contain references to the leaked Ammyy Admin Version 3

Snippet of Ammyy Admin Version 3 source code

Figure 6: Snippet of Ammyy Admin Version 3 source code, file TrMain.cpp

The FlawedAmmyy C&C protocol occurs over port 443 with HTTP. In the initial handshake, sent by the client to the server, the first byte is always “=”, followed by 35 obfuscated and SEAL-encrypted bytes. After a server response (0x2d00), the infected client sends the second packet. This packet has a 5-byte header that includes the length of the rest of the packet (0x78). The body of this packet contains cleartext key-value pairs:

Screenshot of Admin Ammyy malware C&C protocol from Wireshark

Figure 7: Screenshot of FlawedAmmyy C&C protocol from Wireshark

Table 1: Explanation of the key-value pairs sent by the infected client in the second packet

Parameter

Explanation

Example Value

id

8 digit number, the first digit always being ‘5’ and the remaining 7 chosen at random on initialization of the malware

53466221

os

Operating system

7 SP1 x86

priv

Privilege

Admin

cred

Username

DOMAIN\Username1

pcname

Computer name

Computer3

avname

Antivirus product name obtained via WMI query

Windows Defender

card

1 if a usable smart-card is inserted into a reader, 0 otherwise

1

build_time

Malware build time, obtained at runtime by reading the PE timestamp field from its file on disk

14-01-2018 6:34:27

20-02-2018 16:43:10

Conclusion

Ammyy Admin is a popular remote access tool used by businesses and consumers to handle remote control and diagnostics on Microsoft Windows machines. However, leaked source code for Version 3 of Ammyy Admin has emerged as a Remote Access Trojan called FlawedAmmyy appearing in a variety of malicious campaigns. For infected individuals, this means that attackers potentially have complete access to their PCs, giving threat actors the ability to access a variety of services, steal files and credentials, and much more.  We have seen FlawedAmmyy in both massive campaigns, potentially creating a large base of compromised computers, as well as targeted campaigns that create opportunities for actors to steal customer data, proprietary information, and more.

References

[1] https://msdn.microsoft.com/en-us/library/windows/desktop/bb776784(v=vs.85).aspx

[2] https://forums.asp.net/t/1563309.aspx?How+to+create+InternetShortcut+url+

Indicators of Compromise (IOCs)

March 5 campaign:

IOC

IOC Type

Description

18436342cab7f1d078354e86cb749b1de388dcb4d1e22c959de91619947dfd63

SHA256

bill 0256853.zip

d82ca606007be9c988a5f961315c3eed1b12725c6a39aa13888e693dc3b9a975

SHA256

B123177432431.url

file[:]//buyviagraoverthecounterusabb[.]net/documents/B123456789012.js

URL

SMB URL contained in the Internet Shortcut

8903d514549aa9568c7fea0123758b954b9703c301b5e4941acb33cccd0d7c57

SHA256

B37348362793.js (downloaded over SMB)

hxxp://chimachinenow[.]com/kjdhc783

URL

JS Payload Example

hxxp://highlandfamily[.]org/kjdhc783

URL

JS Payload Example

hxxp://intra[.]cfecgcaquitaine[.]com/kjdhc783

URL

JS Payload Example

hxxp://motifahsap[.]com/kjdhc783

URL

JS Payload Example

hxxp://sittalhaphedver[.]com/p66/kjdhc783

URL

JS Payload Example

2b53466eebd2c65f81004c567df9025ce68017241e421abcf33799bd3e827900

SHA256

Quant Loader

hxxp://wassronledorhad[.]in/q2/index.php

SHA256

Quant Loader C&C

hxxp://balzantruck[.]com/45rt.exe

SHA256

Quant Loader Payload (FlawedAmmyy)

0d100ff26a764c65f283742b9ec9014f4fd64df4f1e586b57f3cdce6eadeedcd

SHA256

FlawedAmmyy

179.60.146[.]3:443

IP:Port

FlawedAmmyy C&C

March 1 campaign:

IOC

IOC Type

Description

9a7fb98dd4c83f1b4995b9b358fa236969e826e4cb84f63f4f9881387bc88ccf

SHA256

Macro MHT document Example

hxxp://185.176.221[.]54/chrome.exe

SHA256

Payload download

b0ad80bf5e28e81ad8a7b13eec9c5c206f412870814d492b78f7ce4d574413d2

SHA256

FlawedAmmyy

179.60.146[.]3:443

IP:Port

 C&C

January 16 campaign:

IOC

IOC Type

Description

cafa3466e422dd4256ff20336c1a032bbf6e915f410145b42b453e2646004541

SHA256

FlawedAmmyy

194.165.16.11[:]443

IP:Port

 C&C

Additional samples on Virustotal:

IOC

IOC Type

Description

404d3d65430fbbdadedb206a29e6158c66a8efa2edccb7e648c1dd017de47572

SHA256

FlawedAmmyy

cc0205845562e017ff8b3aafb17de167529d113fc680e07ee9d8753d81487b2f

SHA256

FlawedAmmyy

790e7dc8b2544f1c76ff95e56315fee7ef3fe623975c37d049cc47f82f18e4f2

SHA256

FlawedAmmyy

2d19c42f753dcee5b46344f352c11a1c645f0b77e205c218c985bd1eb988c7ce

SHA256

FlawedAmmyy

6e701670350b4aea3d2ead4b929317b0a6d835aa4c0331b25d65ecbfbf8cb500

SHA256

FlawedAmmyy

3cd39abdbeb171d713ee8367ab60909f72da865dbb3bd858e4f6d31fd9c930d0

SHA256

FlawedAmmyy

1f5d31d41ebb417d161bc49d1c50533fcbff523bb583883b10b14974a3de8984

SHA256

FlawedAmmyy

6877ac35a3085d6c10fa48655cf9c2399bd96c3924273515eaf89b511bbe356a

SHA256

FlawedAmmyy

059c0588902be3e8a5d747df9e91f65cc50d908540bdeb08acf15242cc9a25b5

SHA256

FlawedAmmyy

c8b202e5a737b8b5902e852de730dbd170893f146ab9bbc9c06b0d93a7625e85

SHA256

FlawedAmmyy

927fa5fea13f8f3c28e307ffea127fb3511b32024349b39bbaee63fac8dcded7

SHA256

FlawedAmmyy

6048a55de1350238dfc0dd6ebed12ddfeb0a1f3788c1dc772801170756bf15c7

SHA256

FlawedAmmyy

adfdead4419c134f0ab2951f22cfd4d5a1d83c0abfe328ae456321fccf241eb6

SHA256

FlawedAmmyy

022f662903c6626fb81e844f7761f6f1cbaa6339e391468b5fbfb6d0a1ebf8cb

SHA256

FlawedAmmyy

3f5f5050adcf0d0894db64940299ac07994c4501b361dce179e3d45d9d155adf

SHA256

FlawedAmmyy

cafa3466e422dd4256ff20336c1a032bbf6e915f410145b42b453e2646004541

SHA256

FlawedAmmyy

List of code-signing Certificates used:

Subject Name

Serial Number

CYBASICS LTD

00 BB AE 27 7A C3 D9 CF 3F 85 00 86 A3 14 E7 0A D7

CYBASICS LTD

7F 6B 67 8E 66 DD 35 D6 58 9D 9B B2 0F C3 BA 0B

AdFuture Ltd

25 43 BF D0 26 6A 5C ED A6 63 9A 2A 49 15 75 3A

LLC "ASTER-AYTI"

10 88 E7 1C 82 F9 BB 73 74 7C 6D 0B 75 E0 5F 17

Atrast, OOO

00 A0 71 DB B3 2B 9D E4 F8 D2 17 39 44 C3 C2 39 F9

ET and ETPRO Suricata/Snort Coverage

2025408 | Win32/FlawedAmmyy RAT CnC Checkin

2024452 | ET TROJAN Quant Loader v1.45 Download Request

2023203 | ET TROJAN Quant Loader Download Request

Subscribe to the Proofpoint Blog