Androxgh0st Malware Targets Cloud Services - CISA Alert AA24-016A

The Blue Report 2024

Get a comprehensive analysis of over 136 million cyber attacks and understand the state of threat exposure management.

DOWNLOAD

On January 16, 2024, The Cybersecurity and Infrastructure Security Agency (CISA) released an advisory on Androxgh0st malware [1]. Androxgh0st malware targets .env files that contain confidential data for cloud services such as AWS, Office 365, SendGrid, and Twilio to establish a botnet. The malware also exploits known but critical vulnerabilities to abuse their target's web applications. 

In this blog, we explained the vulnerabilities used by Androxgh0st malware and how organizations can defend themselves against Androxgh0st malware attacks.

Androxgh0st Malware

Androxgh0st malware was first observed in late April 2022 and designed to extract confidential information from exposed Laravel .env files. Many cloud services such as AWS, Office 365, SendGrid, and Twilio use the Laravel .env files as a repository for environment variables, which are key-value pairs that store sensitive or configuration-specific information. Additionally, adversaries use the Androxgh0st malware for scanning, deploying webshells, and exploiting exposed credentials and APIs.

Androxgh0st malware often targets vulnerable web services and abuses known vulnerabilities like PHPUnit CVE-2017-9841, Laravel CVE-2018-15133, and Apache CVE-2021-41773 vulnerabilities.

PHPUnit CVE-2017-9841 Vulnerability

As an initial access vector, Androxgh0st threat actors abuse the PHPUnit CVE-2017-9841 vulnerability. This vulnerability allows adversaries to execute arbitrary commands in the target web service by sending malicious HTTP POST requests to the PHPUnit. 

curl --data "<?php <malicious_payload>;" http://localhost:8888/vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php

Example 1: PoC Exploit for PHPUnit CVE-2017-9841 RCE Vulnerability

After initial access, adversaries deploy the Androxgh0st malware to download additional malware and backdoors to the compromised network. Organizations are advised to patch their vulnerable PHPUnit modules as soon as possible.

Laravel Framework CVE-2018-15133 Vulnerability

As another initial access vector, adversaries utilize a botnet to scan for websites that use the Laravel web application framework and look for a publicly exposed root-level .env file. Since .env files are commonly used to store credentials and access tokens, adversaries aim to extract sensitive information from these files to access user's email and AWS accounts. 

Moreover, Androxgh0st threat actors abuse the Laravel CVE-2018-15133 vulnerability for remote code execution. The vulnerability allows adversaries to execute arbitrary commands remotely using XSRF token values. Adversaries exploit this vulnerability by encrypting their malicious PHP payload with the Laravel application key and crafting an HTTP GET request with the payload as an XSRF token cookie.

Organizations are advised to ensure their live Laravel applications are not in debug or testing mode. Also, all cloud credentials should be removed from .env files and revoked.

Apache CVE-2021-41773 Vulnerability

Androxgh0st threat actors are also observed to scan for web servers running Apache versions 2.4.49 or 2.4.50. These two versions are vulnerable to the CVE-2021-41773 path traversal vulnerability, and adversaries use this vulnerability to obtain credentials and execute code remotely. 

http://$host/cgi-bin/.%2e/.%2e/.%2e/.%2e/etc/passwd

Example 2: PoC Exploit for Apache CVE-2021-41773 RCE Vulnerability

Organizations are advised to patch their vulnerable Apache servers as soon as possible. For more detailed information, you can check our blog post on Apache CVE-2021-41773 vulnerability.

How Picus Helps Simulate Androxgh0st Malware Attacks?

We also strongly suggest simulating Androxgh0st malware attacks to test the effectiveness of your security controls against real-life cyber attacks using the Picus Complete Security Validation Platform. You can also test your defenses against hundreds of other malware variants, such as AveMaria, DarkGate, and PikaBot, within minutes with a 14-day free trial of the Picus Platform.

Picus Threat Library includes the following threats for Androxgh0st malware

Threat ID

Threat Name

Attack Module

34321

AndroxGh0st Hacking Tool Download Threat

Network Infiltration

63450

AndroxGh0st Hacking Tool Email Threat

Email Infiltration (Phishing)

Androxgh0st threat actors also use other tools and vulnerabilities in their attack campaigns.  Picus Threat Library includes the following threats for other tools and vulnerabilities used by Androxgh0st threat actors:

Threat ID

Threat Name

Attack Module

96436

PHPUnit Web Attack Campaign

Web Application

27843

Apache Http Server Web Attack Campaign

Web Application

26651

XMRig Cryptocurrency Miner Download Threat

Network Infiltration

35672

XMRig Cryptocurrency Miner Email Threat

Email Infiltration (Phishing)

Picus also provides actionable mitigation content. Picus Mitigation Library includes prevention signatures to address Androxgh0st malware and other malware attacks in preventive security controls. Currently, Picus Labs validated the following signatures for Androxgh0st malware:

Security Control

Signature ID

Signature Name

Cisco FirePower

 

Auto.6B5846.262458.in02

Forcepoint NGFW

 

File_Malware-Blocked 

Forcepoint NGFW

 

File-Text_Php-Script-External-Command-Execution-Download

Fortigate AV

10121814

Python/AndroxGhost.HACK!tr

Fortigate AV

7605865

Adware/Miner

Palo Alto

624459756

Virus/Linux.WGeneric.eeebqf

Palo Alto

624460302

Virus/Linux.WGeneric.eeebss

Snort

1.45548.2

FILE-EXECUTABLE Win.Trojan.CoinMiner attempted download

Start simulating emerging threats today and get actionable mitigation insights with a  14-day free trialof the Picus Complete Security Validation Platform.

References

[1] "Known Indicators of Compromise Associated with Androxgh0st Malware," Cybersecurity and Infrastructure Security Agency CISA. Available: https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-016a. [Accessed: Jan. 17, 2024]