Hunting for Malware Networks
Details
Hunting for new malware delivery infrastructure often entails the identification and tracking of common techniques to deliver various stages of malware. Take malware-as-a-service providers for instance, some commonalities in a recent activity cluster entailed the use of hosted powershell scripts acting as a reference to the next malware to download and execute.
Multiple clusters of stealer activity were observed through early July using PowerShell scripts as an intermediate stage for malware delivery. Creating multiple stages of delivery reduces the initial risk of exposing all malware and associated infrastructure if it is detected early on in execution. It may also slow down response investigations and analysis.
Hunting for malicious web hosted PowerShell scripts can be as simple as using a Shodan query such as: http.html:”Invoke-WebRequest”.
Example Finding:
77.110.118.195 Resolved malicious domain “alababababa[.]cloud”.
A reused web-hosted powershell script to retrieve a malicious executable, build.exe, which it then starts as a new process.
Filename: build.exe
Sha256: 7ada4d7dfc00943780cb51ea182c7a221953cdabc394011204ba5cd8e4e8f0d3
This script acts as a trojan and connects to a commonly used C2 domain “anodes[.]pro”, which has communicated with more than60 malicious files in the past 2 months, including multiple stealer malware families such as Amadey, Lumma, Luca, DeerStealer, and RedLine as well as other malware families Rugmi, BlackBasta and DarkGate.
Expanding on the domain behavior in VirusTotal, one additional DeerStealer sample was identified, which also used the same C2 domain.
Sha256: bd269a6328de0e534f4d8c3a42ea88a4343168053f63da0da95318f4ed17e705
Expanding on the associated infrastructure of the identified intermediary domain “alababababa[.]cloud” through domain registration overlaps identified potentially related activity.
- NameServer: cloudflare[.]com
- IP ISP: CloudFlare Inc
- Address: compliance_abuse[@]webnic[.]cc
- Registrar: WebNIC
- SSL Issuer: WE1
alababababa[.]cloud hugevcdn[.]pro anodes[.]pro servicesmesh[.]pro interconstructionsite[.]pro zurichinsurince[.]com zhuchengsantian[.]com |
Repeating the previous steps identifies additional malware with commonalities in stealer and C2 usage such as Amadey malware being observed with domain “hugevcdn[.]pro”.
Sha256: 02c158c63d28fd5be24424e41b70a7a361c9be8897590c0453b0d30bd6e0d842
C2: “185.156.72[.]96/te4h2nus/index.php
Similar but considerably higher volume to the C2 domain “anodes[.].pro”, the C2 IP 185.156.72[.]96 has been observed with over 2,700 malicious files communicating to it. Notably with many of the same wide range of malware-as-a-service families using it as a C2.
In addition, many of the malicious files for LummaStealer and Amadey shared a common C2 IP “185.156.72[.]96” and overlaps with a previous LummaStealer IP “185.156.72[.]2”.
Both IPs are part of an obscure ASN (AS61432) TOV VAIZ PARTNER. This ASN has only one prefix (185.156.72.0/24), which shows only 1 out 719 BGP peer propagations for Hurricane Electric Services. The ASN claims Ukrainian origin and appears to only be propagated by 1 other ASN, AS50073 Webcraft Found LLC in Ukraine. This may generally suggest the ASN is part of a BPHS, bulletproof hosting service.
Example LummaStealer C2s associated to IP 185.156.72[.]2 and 185.156.72[.]96 and anodes[.]pro
0a401e0be28cb02b549b63db4681a881ec03091ca058103debe30ef20070aba230dd56520191f9ac29e7eb87c3e428dec6c3ea90baca523ec46f9ce58c6179210dd80560bfc501a9bcdcc45e76b232655eb8cba78d09a8414dc77236a3ead1741149a01c5c8a3870ba40ca68f8e801cc38e5542c1938ed7ee01b14cf2e571258293bf1f2b901f02f23af5c9221989ac82f27b2de061d7df9a035e09e713f914d hxxps[:]//battlefled[.]top/gaoi hxxps[:]//citellcagt[.]top/gjtu hxxps[:]//diecam[.]top/laur/api hxxps[:]//escczlv[.]top/bufi hxxps[:]//korxddl[.]top/qidz hxxps[:]//localixbiw[.]top/zlpa hxxps[:]//narrathfpt[.]top/tekq hxxps[:]//peppinqikp[.]xyz/xaow hxxps[:]//sstemxehg[.]shop/gaks hxxps[:]//stochalyqp[.]xyz/alfp |
Noting a reused SSH certificate “hash:896675070” and “hash:-434889431” from the C2 IP address identifies several historic overlaps such as the following recent IPs:
185.156.72[.]97 > 0176.46.157[.]50 > 570 malicious communicating files185.156.72[.]96 > 2,800 malicious communicating files66.114.52[.]156 > 1 malicious communicating files176.46.157[.]32 > 660 malicious communicating files |
In addition to indications that the large cluster of malware employs Amazon CloudFront, Amazon Global Accelerator EC2s, and Github user content being used to store and distribute malware. All of which create challenges in proactively blocking malicious domains.
Example 1:
https[:]//raw.githubusercontent[.]com/peterson643eu/projecttop/36b05b6030459ba5435705d8b91aae11f0ba268b/NIOAHYWM.exe
https[:]//raw.githubusercontent[.]com/peterson643eu/projecttop/6fd8d0859aa9d3d300bf79f3da8032b04b1ed540/OURDUBDV.exe
https[:]//github[.]com/peterson643eu/projecttop/raw/refs/heads/main/OURDUBDV.exe
Makes request to http[:]//nexuswarps[.]shop/c
C2s: anodes[.]pro, multiport[.]shop
SSL Hash overlaps with a CloudFront IP resolving “70d9ae273c860e606f236c528381f9ca[.]cloudfront[.]net” suggests the CloudFront service may be used to relay traffic to another endpoint serving malware.
Sampling 200 of the communicating files with meaningful detection names in VirusTotal and limiting to the past 3 months there is an overrepresentative share of LummaC2 and Amadey.
Despite law enforcement takedowns targeting LummaStealer infrastructure in May 2025, it appears Lumma is still operating and continues to be a prominent choice. Though we speculate that this particular cluster of malicious activity decidedly experimented with alternative choices during the month of June and may have opted to continue operations with LummaStealer.
Conclusion
Despite a May 2025 law enforcement takedown targeting LummaStealer, the malware family appears to remain active and a popular choice for threat actors, particularly through bulletproof hosting services (BPHS) IPs. This analysis of observed malicious activity, with a focus on C2 IPs 185.156.72[.]96 and 185.156.72[.]2 (both part of AS61432, a suspected BPHS), suggests that while there may have been some experimentation with alternative malware during June, operations have largely continued with LummaStealer.
IOCs
kinwlyo[.]xyz sstemxehg[.]shop anodes[.]pro stochalyqp[.]xyz peppinqikp[.]xyz financialway[.]pro alababababa[.]cloud chainnode[.]shop multiport[.]shop battlefled[.]top localixbiw[.]top korxddl[.]top diecam[.]top escczlv[.]top citellcagt[.]top narrathfpt[.]top zurichinsurince[.]com zhuchengsantian[.]com metaskins[.]gg blogcrptodevelopments[.]com ripple-regulatory[.]com ripple-legal[.]com ripple-regulation[.]com cfd-regulations[.]com avatrade-supervision[.]com avatrade-global[.]com londonoffvisit[.]com avatrade-regulation[.]com avatrade-compliance[.]com avatrade-services[.]com betrunk[.]rocks hugevcdn[.]pro mary-mijote[.]frs ervicesmesh[.]pro interconstructionsite[.]pro osuszaczemlawa[.]pl registrokim[.]online orlideti[.]com |