Prometei Botnet Targets Windows Servers to Gain Remote Access and Deploy Malware

Prometei Botnet Targets Windows Servers to Gain Remote Access and Deploy Malware
Prometei Botnet Targets Windows Servers to Gain Remote Access and Deploy Malware
eSentire’s Threat Response Unit (TRU) spotted Prometei, a Russian-linked botnet active since 2016, hitting a construction firm’s Windows Server.

This modular malware grabs remote control, steals credentials, mines Monero crypto, spreads laterally, and locks out rivals with self-defense tricks. It phones home via ClearWeb and TOR for commands.

Attackers likely slipped in via weak Remote Desktop Protocol (RDP) credentials, a common entry point without strong logs or EDR tools. They ran a sneaky elevated command blending cmd and PowerShell:

It first writes a 4-byte XOR key (“12rn”) to C:Windowsmshlpda32.dll. Then PowerShell fetches an encrypted payload from 103.91.90.182, base64-decodes it, applies a rolling XOR decrypt (counter +66 per byte, position tweak: (byte XOR (i*3 & 255) - j) & 255), drops it as C:Windowszsvc.exe, and runs it.

No key file? Prometei fakes benign acts like pinging and dumping systeminfo to C:Windowstempsetup_gitlog.txt then quits. Smart sandbox dodge.

ywAAAAAAQABAAACAUwAOw==

Attack Chain and Persistence

Prometei copies to sqhost.exe, sets it as an auto-start service “UPlugPlay”, carves Windows Firewall holes, adds Defender exclusions for C:Windowsdell, and disables WinRM.

It fingerprints the box using LOLBins (wmic, cmd /c ver) and COM queries for AV products, then registers with C2 at 103.176.111.176.

C2 chats use HTTP GET params: RC4-encrypted data (RSA-1024 wrapped keys), LZNT1 compression, base64 double-wraps.

Prefixes like “E$” flag encryption, “Z$” compression. Params include i (random ID), r (CPU load), add (sysinfo), h (hostname), answ (task replies like process lists).

A batch script in dellwalker_updater.cmd grabs 7-Zip and update.7z (pass: “horhor123”) from 23.248.230.26, unpacking modules:

  • netdefender.exe: Blocks brute-force IPs via Event ID 4625.
  • rdpcIip.exe: RDP spreader.
  • miWalk*.exe: Mimikatz for creds.
  • windrlver.exe: SSH propagation.
  • TOR proxies (msdtc.exe, smcard.exe).

No direct CVEs in this op, but Prometei exploits weak configs tied to these:

CVE ID Description CVSS Affected Windows Versions
CVE-2022-24500 Stack buffer overflow in CLFS driver 7.8 Win 7-11, Server 2008-2022
CVE-2021-36934 Win32k elevation via HiveNightmare 7.8 Win 10/Server 2019
CVE-2019-0708 RDP BlueKeep remote code exec 9.8 Win 7/Server 2008

Sample SHA256: 8d6f833656638f8c1941244c0d1bc88d9a6b2622a4f06b1d5340eac522793321.

Patch RDP vulns, enforce MFA/complex passphrases, lock accounts after fails, ban LOLBins with AppLocker, deploy EDR/MDR. eSentire isolated the host and aided cleanup check their Yara rule for hunts.

Prometei shows botnets evolving: exclusive access via defender modules keeps it sticky. Stay vigilant on servers.

Follow us on Google News , LinkedIn and X to Get More Instant UpdatesSet Cyberpress as a Preferred Source in Google.

The post Prometei Botnet Targets Windows Servers to Gain Remote Access and Deploy Malware appeared first on Cyber Security News.


Discover more from RSS Feeds Cloud

Subscribe to get the latest posts sent to your email.

Discover more from RSS Feeds Cloud

Subscribe now to keep reading and get access to the full archive.

Continue reading