Neonprimetime

2018-04-03 #quantloader #malspam found by @James_inthe_box

Apr 3rd, 2018
414
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.22 KB | None | 0 0
  1. found by @James_inthe_box
  2. #quantloader #malspam run: "Emailing: <characters>", zip (is muffed, base64 file) -> smblink -> js -> #quantloader
  3. https://twitter.com/James_inthe_box/status/980808229260161024
  4. https://www.hybrid-analysis.com/sample/00ca7e9e61a3ceaa4b9250866aface8af63e5ae71435d4fd6c770a8c9a167f22/5ac21b077ca3e10c8716fbc0
  5.  
  6. downloads EvilAmmy ( https://pastebin.com/teJp9PtS )
  7.  
  8. ------------------------
  9. interesting api calls
  10. ------------------------
  11. strcat ( "", "http://200.7.111.128/e6/index.php" )
  12. WININET.DLL StrCmpNICA ( "https", "https://bdns.at/r/biberonata.bit", 5 )
  13. strlen ( "http://biberonata.bit/e6/index.php" )
  14. CreateFileA ( "c:\users\xxx\appdata\roaming\16643456\dwm.exe", 0, FILE_SHARE_DELETE | FILE_SHARE_READ | FILE_SHARE_WRITE, NULL, OPEN_EXISTING, FILE_FLAG_NO_BUFFERING | FILE_FLAG_SEQUENTIAL_SCAN, NULL )
  15. CreateProcessA ( NULL, "netsh advfirewall firewall add rule name="Quant" program="c:\users\xxx\desktop\[removed].exe" dir=Out action=allow", NULL, NULL, FALSE, CREATE_NEW_CONSOLE, NULL, NULL, 0x0012ec10, 0x0012ec00 )
  16. CreateProcessA ( NULL, "cmd /c echo Y|CACLS "c:\users\xxx\appdata\roaming\16643456\dwm.exe" /P "xxx:R"", NULL, NULL, FALSE, CREATE_NEW_CONSOLE, NULL, NULL, 0x0012ec10, 0x0012ec00 )
Add Comment
Please, Sign In to add comment