06/03/2019

Threat Alert: Microsoft Azure Currently Hosting Malware

by David Pickett


This article originally appeared on the AppRiver blog.


On Sept. 7, 2018, AppRiver detailed how malicious attackers abused Azure's Custom Domain Name registrations to host credential phishing sites. On April 29, 2019, we released information on how compromised user data was exposed from attacks originating from phishing sites hosted on Azure.

Now the attacks have escalated to malware being hosted on the Azure service. Not only is Azure hosting malware, it is also functioning as the command and control infrastructure for the malicious files.

On May 11, 2019, malware researchers @JayTHL & @malwrhunterteam discovered the malicious software on Azure. It was reported to Microsoft on May 12 for abuse via ticket #SIR0552640.  However, the original malware (plus additional samples uploaded since) still resided on the Azure site as of May 29, 2019 - 17 days later.
 

Malware Agent Detected by Windows Defender

 

No service is infallible to being attacked or exploited. It's evident that Azure is not currently detecting the malicious software residing on Microsoft's servers. However, if a user attempts to download the executables, Windows Defender does detect the malicious files.

The first sample (searchfile.exe) was uploaded to VirusTotal on April 26, 2019. Windows Defender detects it as Trojan:Win32/Occamy.C. However, it does not appear the service is currently scanning Azure sites or, one could surmise that these files would've been detected by now. Another sample (printer/prenter.exe) was first submitted April 30, but also remains undetected on Azure servers.

Analysis of printer.exe shows the sample being a simple uncompiled c# .net portable executable file. Using an uncompiled file is an evasion attempt for avoiding gateway and endpoint security solutions that heavily scrutinize downloaded binaries. Upon execution, the command line is invoked to run the the built-in visual c# compiler which activates the payload.

Once running, this malicious agent generates XML SOAP requests every 2 minutes to check-in and receive commands from the malicious actors Azure command and control site at: systemservicex[.]azurewebsites[.]net/data[.]asmx

Zix Protection

 

It only takes one malicious email to infiltrate your network or take hostage your data. Minimize that risk with the right solution, the right approach and the right people behind it. With multi-layer protection and live email security experts, ZixProtect takes the guess work out of keeping your email, employees and business safe from the latest threats.

Stop evasive malware campaigns in their tracks with ZixProtect.

Posted: 6/3/2019 2:37:45 PM by Mark Beebe | with 0 comments


Recent Posts

08/20/2019

Fraudsters Capitalizing on Equifax Breach Settlement with Deceptive Websites

by David Bisson

View Blog Post

08/19/2019

Will New FINRA Guidelines Affect Your Third-Party Partnerships?

View Blog Post

08/13/2019

Ransomware Overtook Banking Trojans in H1 2019 Email Malware Campaigns

by David Bisson

View Blog Post