Malspam Targets AnyDesk and Microsoft Teams

Home/malicious cyber actors, Malware, Security Advisory, Security Update, Spam/Malspam Targets AnyDesk and Microsoft Teams

Malspam Targets AnyDesk and Microsoft Teams

Cybersecurity researchers have uncovered a sophisticated malspam campaign targeting users via email and phone. Attackers are exploiting AnyDesk and Microsoft Teams to gain unauthorized access to victims’ computers, highlighting evolving cybercriminal tactics.

All about the Malspam Campaign

The campaign starts with an “email bomb” to flood the victim’s inbox and hide malicious intent. Attackers then use Microsoft Teams to call the victim, pretending to be a legitimate representative and persuading them to install AnyDesk. Once AnyDesk is installed, the attacker gains full control of the victim’s computer.

Once remote access is established, attackers deploy malicious payloads to steal sensitive data, including login credentials, financial details, and personal documents.

The remote control also allows for additional malware installation, increasing the risk of prolonged system compromise and data exploitation. This campaign highlights the urgent need for increased vigilance from users and organizations.

Cybersecurity experts advise caution with unsolicited emails and phone calls, particularly those asking for software installations or remote access tools.

Organizations should enforce strong security measures, train employees to recognize phishing attempts, and use multi-factor authentication to protect platforms like Microsoft Teams. Staying informed and adopting proactive security practices are essential for defending against these advanced threats.

Indicators of Compromise

Network Based Indicators (NBIs)

Domain/IPv4 AddressNotes
spamicrosoft[.]comUsed to make external Microsoft Teams calls after email bombing users.
37.221.126[.]202C2 address used by the threat actor to connect via Anydesk.
91.196.70[.]160Socks proxy server.
halagifts[.]comSystemBC C2 domain
217.15.175[.]191SystemBC C2 IP address
preservedmoment[.]comCobalt Strike domain
45.155.249[.]97Cobalt Strike C2 IP address
77.238.224[.]56C2 address.
77.238.229[.]63C2 address.
77.238.250[.]123C2 address.
77.238.245[.]233C2 address.
91.142.74[.]28C2 address.
191.142.74[.]28C2 address.
195.2.70[.]38C2 address.
falseaudiencekd[.]shopLumma C2 domain
feighminoritsjda[.]shopLumma C2 domain
justifycanddidatewd[.]shopLumma C2 domain
marathonbeedksow[.]shopLumma C2 domain
pleasurenarrowsdla[.]shopLumma C2 domain
raiseboltskdlwpow[.]shopLumma C2 domain
richardflorespoew[.]shopLumma C2 domain
strwawrunnygjwu[.]shopLumma C2 domain

Host Based Indicators (HBIs)

FileSHA256Notes
AntiSpam.exeed062c189419bca7d8c816bcdb1a150c7ca7dd1ad6e30e1f46fae0c10ab062efCredential harvester, version 1.
AntiSpam.exed512bf205fb9d1c429a7f11f3b720c74680ea88b62dda83372be8f0de1073a08Credential harvester, version 2.
AntiSpam.exedc5c9310a2e6297caa4304002cdfb6fbf7d6384ddbd58574f77a411f936fab0bCredential harvester, version 3.
update1.exe24b6ddd3028c28d0a13da0354333d19cbc8fd12d4351f083c8cb3a93ec3ae793Original filename: YandexDiskSetup.exe.
update4.exe9c1e0c8c5b9b9fe9d0aa533fb7d9d1b57db98fd70c4f66a26a3ed9e06ac132a7Original filename: APEXScan.exe. Socks proxy.
update6.exeac22ab152ed2e4e7b4cd1fc3025b58cbcd8d3d3ae3dbc447223dd4eabb17c45cUsed to attempt exploitation of CVE-2022-26923 for privilege escalation.
update7.exeab1f101f6cd7c0cffc65df720b92bc8272f82a1e13f207dff21caaff7675029fOriginal filename: KLDW.exe. SystemBC malware.
update8.exe9ED2B4D88B263F5078003EF35654ED5C205AC2F2C0E9225D4CDB4C24A5EA9AF2Original filename: YandexDiskSetup.exe. SystemBC malware.
update2.dllab3daec39332ddeeba64a2f1916e6336a36ffcc751554954511121bd699b0caaOriginal filename: atiumdag.dll
update5.dll7d96ec8b72015515c4e0b5a1ae6c799801cf7b86861ade0298a372c7ced5fd93Original filename: Log.dll. Socks proxy.
update7.ps19dc809b2e5fbf38fa01530609ca7b608e2e61bd713145f84cf22c68809aec372Socks proxy script.
AntiSpam.exefb4fa180a0eee68c06c85e1e755f423a64aa92a3ec6cf76912606ac253973506Not analyzed in this blog, likely cred harvester.
AntiSpam.exefcf59559731574c845e42cd414359067e73fca108878af3ace99df779d48cbc3Not analyzed in this blog, likely cred harvester.
update5.dll949faad2c2401eb854b9c32a6bb6e514ad075e5cbe96154c172f5f6628af43edNot analyzed in this blog, likely socks proxy.
update2.dllb92cf617a952f0dd2c011d30d8532d895c0cfbfd9556f7595f5b220e99d14d64Not analyzed in this blog, likely Golang HTTP beacon.
APEXScan.execff5c6694d8925a12ce13a85e969bd468e28313af2fb46797bdcf77092012732Not analyzed in this blog, likely socks proxy.
unnamedcb03b206d63be966ddffa7a2115ea99f9fec50d351dce03dff1240bb073b5b50Not analyzed in this blog, likely the same BOF contained within update6.exe.
update1.execcaa8c8b39cb4a4de4944200936bcd4796367c16421a89e6a7d5476ae2da78cdNot analyzed in this blog, likely Golang HTTP beacon.
update4.exe1ade6a15ebcbe8cb9bda1e232d7e4111b808fd4128e0d5db15bfafafc3ec7b8eNot analyzed in this blog, likely socks proxy.
lu2.exece1f44a677d9b7d1d62373175f5583d9e8c04e16ebd94656e21aa296e00e93d7Original filename: swi_config.exe. Packed copy of Lumma Stealer.

‍Follow Us on: Twitter, InstagramFacebook to get the latest security news!

By | 2024-09-10T02:39:54+05:30 August 16th, 2024|malicious cyber actors, Malware, Security Advisory, Security Update, Spam|

About the Author:

FirstHackersNews- Identifies Security

Leave A Comment

Subscribe to our newsletter to receive security tips everday!