MaaS operation using Emmenhtal and Amadey linked to threats against Ukrainian entities

A Malware-as-a-Service operation utilizing Amadey for payload delivery has been identified, with connections to a SmokeLoader phishing campaign targeting Ukrainian entities. The operation exploits fake GitHub accounts to host payloads and tools, bypassing web filtering. Emmenhtal, a multistage downloader, is used to download Amadey and other malware. The activity involves various malware families and GitHub repositories for staging custom payloads. Similarities in tactics and indicators between the SmokeLoader campaign and Amadey MaaS activity have been observed. The operation demonstrates adaptability in delivering diverse tooling, including legitimate software like PuTTY. The threat actors employ sophisticated obfuscation techniques and leverage public platforms for malware distribution. Author: AlienVault

Related Tags:
emmenhtal

T1102.002

T1588.001

T1573.001

T1204.001

T1132.001

downloader

Obfuscation

rhadamanthys

Associated Indicators:
35C1EB5FF8913C4CA4FEB712E05354772146247BDB4B337868C687730F201023

718BE762E8BD513283CD5E21634DC65BD160E47121716FD058DAF5F3BE42728A

21CF7DA02E01B3C2317178395EFF873E50AB9B8F27A23FFED37B2EFFF8FD6B90

0334CD1B8AB17203179DA1AE77C1FAD97DDF794CC63A6048ACA664956D10B2CA

50C5D24005F477410C633AF5D2DD90E6BCB8F116

73EFC19941B9341F7735A616888B4F306B4815EB

8975046C5CDBAB0E36AA9CCAD61B05A898810079

E1D65DAAF338663006014F7D86EEA5AEBF142134

22892B8303FA56F4B584A04C09D508D8