HackTool.Win32.ASPXSpy

Overview

Type: Hacktool
Destruction Level: High
Prevalence: Low

 

Malware name(s)

  • HackTool.Win32.ASPXSpy (Padvish)
  • HackTool.Win32.ASPXSpy (Eset)
  • Backdoor:MSIL/AspxSpy.A (Microsoft)

What is a hackTool?

Hacktools are tools designed to facilitate intrusion. These tools can be used by an intruder to recieve data from the victim organization’s network. These tools are commonly used to retrieve the credentials of sensitive victim servers. For example, an intruder can use hacktools to guess passwords based on Brute Force attacks. In some cases, to escalate access levels and exploit existing vulnerabilities, HackTools are used. In general, hack tools can crash the computer and network security barriers and provide various capabilities to infiltrate systems.

What is ASPXSpy malware?

ASPXSpy is a web-based hack tool written in the ASPX programming language. It has been developed and is accessible as open-source on the Internet. Once installed on the victim’s servers, this tool enables the attacker to retrieve the victim’s server specifications, conduct port scanning operations, manipulate the victim’s file system, registry, and database, and execute command-line CMD as desired by the attacker.

 

Technical review

 

Indicators of Compromise (IoC)

The signs of infection (or IoCs) can vary based on the commands received from the attacker.

 

Performance description

This tool initially receives the password from the attacker through the following login form and subsequently grants attacker, access to the implemented functionalities. In the provided examples, the password is the string “admin”.

 

AspxSpy شرح عملکرد🔸 The image below presents an example of the features of this tool

 امکانات ابزار AspxSpy

 

🔸As shown in the image above, the ASPXSpy penetration tool provides various features and capabilities to the attacker, which are described in the table below:

Feature Description
File Manager Provides the ability to manage the file system of the victim’s server, including deleting, creating, editing, renaming, copying, changing file timestamps, and downloading/uploading files.
File Search Enables searching and modifying the content of any file on the victim’s server.
CmdShell Allows execution of command-line cmds specified by the attacker using cmd.exe, with the output sent back to the attacker.
IIS Spy Displays the web server details, including usernames and passwords, extracting items such as the web server name, domain name, IP address, and port number assigned to the web server.
Process Displays the list of the system’s current processes, including the process name, ID, number of threads, execution priority, and the ability to terminate them.
Services Displays the list of services registered in the system, including the name, corresponding process ID, path of the executable file, current state of the service, and its start state
UserInfo Displays system users and their details.
SysInfo Displays system information, including OS information, hardware specifications, information about installed drivers, and MAC address(es).
RegShell Allows access to the victim server’s registry, enabling the viewing, deletion, creation, and editing of registry keys.
PortScan Enables scanning of desired ports on the current server or external servers.
DataBase Provides the ability to connect and execute queries for MSSQL and OleDb databases.
PortMap  Facilitates Port Forwarding operations, mapping remote connections to IP addresses and local ports.
WmiTools Allows connection to the namespaces of the victim server and execution of WMI queries.
PluginLoader Uploads a file into the current processor memory.
ADSViewer Enables viewing of the active directory of the victim server along with their features and subdirectories.

 

🔸In the image below, the code related to the PluginLoader feature is presented in a sample of this malware.

کد مربوط به قابلیت PluginLoader بدافزار

 

How to deal with and clean the system?

Padvish antivirus can detect this malware and remove it from the system. It is also recommended to regularly update your operating system and antivirus software.

Leave a Reply

Your email address will not be published. Required fields are marked *

You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>