Case of Attacks Targeting MS-SQL Servers to Install Ammyy Admin
A series of attacks targeting poorly managed MS-SQL servers have been identified, involving the installation of Ammyy Admin, a remote control tool. The attackers exploit vulnerable servers, execute commands to gather system information, and use WGet to install additional malware. The installed malware includes Ammyy Admin (mscorsvw.exe), its settings file (settings3.bin), and PetitPotato (p.ax). The attackers utilize an old version of Ammyy Admin (v3.10) and employ known exploitation methods to gain remote control. They also use PetitPotato for privilege escalation, adding new users and activating RDP services. To prevent such attacks, administrators are advised to use strong passwords, update software regularly, and implement security measures like firewalls.
AI Analysis
Technical Summary
This threat involves a series of attacks targeting poorly managed Microsoft SQL (MS-SQL) servers. Attackers exploit weak security configurations, primarily through brute force and dictionary attacks against MS-SQL authentication, to gain initial access. Once access is obtained, they execute commands to gather system information (technique T1082) and use WGet to download and install additional malware components. The primary malware installed is an outdated version (v3.10) of Ammyy Admin, a legitimate remote control tool, disguised as 'mscorsvw.exe' alongside its configuration file 'settings3.bin'. Additionally, the attackers deploy PetitPotato (p.ax), a known privilege escalation tool that exploits Windows token impersonation vulnerabilities to elevate privileges (technique T1068). With escalated privileges, the attackers create new user accounts and enable Remote Desktop Protocol (RDP) services to maintain persistent remote access. The attack chain leverages multiple MITRE ATT&CK techniques including brute force (T1110), remote service exploitation (T1021), command execution (T1059), and persistence via new user creation (T1136). The use of an outdated Ammyy Admin version suggests reliance on known vulnerabilities or lack of detection signatures. The attackers exploit common misconfigurations such as weak passwords and unpatched MS-SQL servers, emphasizing the importance of proper server hardening. No specific affected product versions are listed, indicating the attack targets any MS-SQL server with weak security. There are no known exploits in the wild beyond these observed attacks, and no CVSS score is assigned. The threat is rated medium severity by the source, reflecting moderate impact potential and exploitation complexity.
Potential Impact
For European organizations, the impact of this threat can be significant, especially for entities relying on MS-SQL servers for critical business operations. Successful exploitation can lead to unauthorized remote control of servers, enabling attackers to exfiltrate sensitive data, manipulate databases, or use the compromised infrastructure as a foothold for lateral movement within the network. The installation of Ammyy Admin allows persistent remote access, increasing the risk of prolonged undetected compromise. Privilege escalation via PetitPotato further exacerbates the threat by granting attackers administrative control, which can lead to disabling security controls, deploying ransomware, or establishing backdoors. Organizations in sectors such as finance, healthcare, manufacturing, and government are particularly at risk due to their reliance on MS-SQL databases and the sensitivity of stored data. Additionally, enabling RDP services and adding new users can facilitate further attacks or insider threats. The medium severity rating reflects that while the attack requires some initial misconfiguration (weak passwords, unpatched servers), the consequences can be severe if exploited. The threat also poses reputational and regulatory risks under GDPR if personal data is compromised. Given the use of legitimate tools like Ammyy Admin, detection may be challenging, increasing dwell time and potential damage.
Mitigation Recommendations
To mitigate this threat effectively, European organizations should implement the following specific measures beyond generic advice: 1) Enforce strong, complex passwords and implement account lockout policies on MS-SQL servers to prevent brute force and dictionary attacks. 2) Disable or restrict remote access protocols such as RDP unless absolutely necessary, and enforce network-level authentication and multi-factor authentication (MFA) for remote connections. 3) Regularly audit MS-SQL server configurations and patch all known vulnerabilities promptly, including underlying Windows OS patches that address privilege escalation vectors exploited by PetitPotato. 4) Monitor for unusual process executions and network connections, specifically looking for the presence of 'mscorsvw.exe' in unexpected contexts and the download of files via WGet or similar tools. 5) Implement application whitelisting to prevent unauthorized execution of tools like Ammyy Admin and PetitPotato. 6) Conduct regular user account reviews to detect unauthorized additions and disable unused accounts. 7) Employ network segmentation to isolate database servers from general user networks and limit lateral movement. 8) Use endpoint detection and response (EDR) solutions capable of detecting privilege escalation and remote control tool behaviors. 9) Educate administrators on the risks of using outdated remote control software versions and encourage the use of secure, updated alternatives. 10) Establish comprehensive logging and alerting for MS-SQL authentication failures and privilege escalation attempts to enable rapid incident response.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
Indicators of Compromise
- hash: 1c9c3b4a2753ecab833621701e1b492c
- hash: 55f4a1393e2edafea92d7ebab09c92d6
- hash: 753f5e2fc5bdbc9b2175913d3b883580
- hash: b3b9eb83af47770dbb8e86f95afe9634
- hash: 1af757d777b664e6048e4001f45c7e004ab65f47
- hash: c0f17c77a25475496f23c6296ce1043aaed00f83
- hash: 9d019136cb08075cc3c25e23ccff919b16eb79060c45ceba1004edc96980416d
- hash: ce226d9a3a2c25c4d8f8f333aede73692f76be51423948084eba360b2fed2547
- url: http://1.220.228.82/mscorsvw1.log
- url: http://1.220.228.82/settings3.bin
- url: http://110.45.186.8/aa_v3_protected.exe
- url: http://110.45.186.8/mscorsvw.log
Case of Attacks Targeting MS-SQL Servers to Install Ammyy Admin
Description
A series of attacks targeting poorly managed MS-SQL servers have been identified, involving the installation of Ammyy Admin, a remote control tool. The attackers exploit vulnerable servers, execute commands to gather system information, and use WGet to install additional malware. The installed malware includes Ammyy Admin (mscorsvw.exe), its settings file (settings3.bin), and PetitPotato (p.ax). The attackers utilize an old version of Ammyy Admin (v3.10) and employ known exploitation methods to gain remote control. They also use PetitPotato for privilege escalation, adding new users and activating RDP services. To prevent such attacks, administrators are advised to use strong passwords, update software regularly, and implement security measures like firewalls.
AI-Powered Analysis
Technical Analysis
This threat involves a series of attacks targeting poorly managed Microsoft SQL (MS-SQL) servers. Attackers exploit weak security configurations, primarily through brute force and dictionary attacks against MS-SQL authentication, to gain initial access. Once access is obtained, they execute commands to gather system information (technique T1082) and use WGet to download and install additional malware components. The primary malware installed is an outdated version (v3.10) of Ammyy Admin, a legitimate remote control tool, disguised as 'mscorsvw.exe' alongside its configuration file 'settings3.bin'. Additionally, the attackers deploy PetitPotato (p.ax), a known privilege escalation tool that exploits Windows token impersonation vulnerabilities to elevate privileges (technique T1068). With escalated privileges, the attackers create new user accounts and enable Remote Desktop Protocol (RDP) services to maintain persistent remote access. The attack chain leverages multiple MITRE ATT&CK techniques including brute force (T1110), remote service exploitation (T1021), command execution (T1059), and persistence via new user creation (T1136). The use of an outdated Ammyy Admin version suggests reliance on known vulnerabilities or lack of detection signatures. The attackers exploit common misconfigurations such as weak passwords and unpatched MS-SQL servers, emphasizing the importance of proper server hardening. No specific affected product versions are listed, indicating the attack targets any MS-SQL server with weak security. There are no known exploits in the wild beyond these observed attacks, and no CVSS score is assigned. The threat is rated medium severity by the source, reflecting moderate impact potential and exploitation complexity.
Potential Impact
For European organizations, the impact of this threat can be significant, especially for entities relying on MS-SQL servers for critical business operations. Successful exploitation can lead to unauthorized remote control of servers, enabling attackers to exfiltrate sensitive data, manipulate databases, or use the compromised infrastructure as a foothold for lateral movement within the network. The installation of Ammyy Admin allows persistent remote access, increasing the risk of prolonged undetected compromise. Privilege escalation via PetitPotato further exacerbates the threat by granting attackers administrative control, which can lead to disabling security controls, deploying ransomware, or establishing backdoors. Organizations in sectors such as finance, healthcare, manufacturing, and government are particularly at risk due to their reliance on MS-SQL databases and the sensitivity of stored data. Additionally, enabling RDP services and adding new users can facilitate further attacks or insider threats. The medium severity rating reflects that while the attack requires some initial misconfiguration (weak passwords, unpatched servers), the consequences can be severe if exploited. The threat also poses reputational and regulatory risks under GDPR if personal data is compromised. Given the use of legitimate tools like Ammyy Admin, detection may be challenging, increasing dwell time and potential damage.
Mitigation Recommendations
To mitigate this threat effectively, European organizations should implement the following specific measures beyond generic advice: 1) Enforce strong, complex passwords and implement account lockout policies on MS-SQL servers to prevent brute force and dictionary attacks. 2) Disable or restrict remote access protocols such as RDP unless absolutely necessary, and enforce network-level authentication and multi-factor authentication (MFA) for remote connections. 3) Regularly audit MS-SQL server configurations and patch all known vulnerabilities promptly, including underlying Windows OS patches that address privilege escalation vectors exploited by PetitPotato. 4) Monitor for unusual process executions and network connections, specifically looking for the presence of 'mscorsvw.exe' in unexpected contexts and the download of files via WGet or similar tools. 5) Implement application whitelisting to prevent unauthorized execution of tools like Ammyy Admin and PetitPotato. 6) Conduct regular user account reviews to detect unauthorized additions and disable unused accounts. 7) Employ network segmentation to isolate database servers from general user networks and limit lateral movement. 8) Use endpoint detection and response (EDR) solutions capable of detecting privilege escalation and remote control tool behaviors. 9) Educate administrators on the risks of using outdated remote control software versions and encourage the use of secure, updated alternatives. 10) Establish comprehensive logging and alerting for MS-SQL authentication failures and privilege escalation attempts to enable rapid incident response.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://asec.ahnlab.com/en/87606"]
- Adversary
- Pulse Id
- 6807c69906b162a197133ee9
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash1c9c3b4a2753ecab833621701e1b492c | — | |
hash55f4a1393e2edafea92d7ebab09c92d6 | — | |
hash753f5e2fc5bdbc9b2175913d3b883580 | — | |
hashb3b9eb83af47770dbb8e86f95afe9634 | — | |
hash1af757d777b664e6048e4001f45c7e004ab65f47 | — | |
hashc0f17c77a25475496f23c6296ce1043aaed00f83 | — | |
hash9d019136cb08075cc3c25e23ccff919b16eb79060c45ceba1004edc96980416d | — | |
hashce226d9a3a2c25c4d8f8f333aede73692f76be51423948084eba360b2fed2547 | — |
Url
Value | Description | Copy |
---|---|---|
urlhttp://1.220.228.82/mscorsvw1.log | — | |
urlhttp://1.220.228.82/settings3.bin | — | |
urlhttp://110.45.186.8/aa_v3_protected.exe | — | |
urlhttp://110.45.186.8/mscorsvw.log | — |
Threat ID: 682f4bb70acd01a2492622b7
Added to database: 5/22/2025, 4:07:19 PM
Last enriched: 6/22/2025, 4:08:09 AM
Last updated: 8/11/2025, 6:45:35 AM
Views: 18
Related Threats
ThreatFox IOCs for 2025-08-13
MediumEfimer Trojan Steals Crypto, Hacks WordPress Sites via Torrents and Phishing
MediumCoordinated Brute Force Campaign Targets Fortinet SSL VPN
MediumSilent Watcher: Dissecting Cmimai Stealer's VBS Payload
MediumCastleLoader Analysis
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.