Author:
Kaustubh Jagtap, Product Marketing Director, SafeBreach
On January 16th, the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent advisory to highlight the ongoing malicious activities by threat actors deploying the Androxgh0st Malware. Detailed information about these activities and the associated indicators of compromise (IOCs) and the various tactics, techniques, and procedures (TTPs) is listed in Known Indicators of Compromise Associated with Androxgh0st Malware. According to the advisory, unknown threat actors have leveraged the Androxgh0st malware for its ability to establish a botnet to identify further potential victims and compromise their networks.
Researchers first came across the Androxgh0st malware in December 2022 when it was used in several campaigns to steal credentials. Androxgh0st malware is a python-scripted malware that has been used to target the “.env” files containing sensitive data such as credentials for high-profile applications like Amazon Web Services (AWS), MS Office 365, SendGrid, and Twilio (from the Laravel web application framework. It is also believed that Androxgh0st malware can support several other functions that can abuse the Simple Mail Transfer Protocol (SMTP), including scanning, exploiting exposed credentials and application programming interfaces (APIs), and deploying web shells.
Targeting the PHPUnit – TTPs involved during an Androxgh0st malware attack on vulnerable PHP servers typically include the use of scripts to scan and search for websites with specific vulnerabilities. Threat actors have been observed exploiting CVE-2017-9841 which allows them to remotely run PHP code on vulnerable sites via PHPUnit. Websites using the PHPUnit module that have internet-accessible (exposed) /vendor folders are subject to malicious HTTP POST requests to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php uniform resource identifier (URI). This PHP page runs PHP code submitted through a POST request, which allows the threat actors to remotely execute code. Any threat actor leveraging the Androxgh0st malware can download malicious files to the system hosting the vulnerable website. They can even set up a fake page accessible via the uniform resource identifier (URI) to then access the website allowing them to further download malicious files.
Targeting the Laravel Framework – Threat actors have also been observed leveraging Androxgh0st malware to establish a botnet to scan for websites that use the Laravel web application framework. After identifying such websites, threat actors attempt to determine if the domain’s root-level .env file is exposed and contains credentials for accessing additional services. If the .env file is exposed, threat actors will issue a GET request to the /.env URI to attempt to access the data on the page. This method appears to be used for websites in debug mode (i.e., when non-production websites are exposed to the internet). A successful response allows the threat actors to look for usernames, passwords, and/or other credentials pertaining to services such as email (via SMTP) and AWS accounts.
If the threat actors successfully identify the Laravel application key, they will attempt exploitation by using the key to encrypt the PHP code The encrypted code is then passed to the website as a value in the cross-site forgery request (XSRF) token cookie, XSRF-TOKEN, and included in a future GET request to the website. The vulnerability defined in CVE-2018-15133 indicates that on Laravel applications, XSRF token values are subject to an un-serialized call, which can allow for remote code execution. In doing so, the threat actors can upload files to the website via remote access.
Targeting Apache Web Servers – Androxgh0st actors have been observed scanning vulnerable web servers running Apache HTTP Server versions 2.4.49 or 2.4.50. Threat actors can identify uniform resource locators (URLs) for files outside the root directory through a path traversal attack. If these files are not protected by the “request all denied” configuration and Common Gateway Interface (CGI) scripts are enabled, this may allow for remote code execution.
Bottomline – If threat actors obtain credentials for any services using the above methods, they may use these credentials to access sensitive data or use these services to conduct additional malicious operations.
Important Note for SafeBreach Customers – Coverage for AA24-016A (Androxgh0st Malware)
As soon as details were made available, the SafeBreach Labs teams mapped existing attacks and added new attacks to the Hacker’s Playbook immediately. It is important to note that existing SafeBreach customers were already protected against several of the behavioral and IOC-based attacks identified in the advisory. Please run/ re-run the attacks listed below to ensure your environments are protected against this malware variant.
NEW IOC-Based Attacks Related to CERT Alert
Existing Behavioral Attacks Mapped to the CERT Alert
Existing IOC-based Attacks Mapped to the CERT Alert
What You Should Do Now
The playbook has been updated with new attacks that map to the IOCs identified in this US-CERT Alert. SafeBreach customers can now validate their security controls against these TTPs and IOCs in multiple ways.
Method 1 – You can go to the “SafeBreach Scenarios” page and choose the AA24-016A (Androxgh0st Malware) scenario from the list of available scenarios.
Method 2 – – From the Attack Playbook, select and filter attacks related to US-CERT Alert AA24-016A (Androxgh0st Malware). Additionally, you can refer to the list above as well to ensure a comprehensive level of coverage.
Method 3 – From the Known Attack Series report, select the AA24-016A (Androxgh0st Malware) report and select Run Simulations which will run all attack methods.
NOTE – FBI and CISA recommend continually validating your security program, at scale, in a production environment to ensure optimal performance against growing threat of advanced cyber threats. Additional recommendations include: