Story image

'URL file outbreak' used to distribute Quant Loader Trojan

11 Apr 18

Barracuda Networks is tracking a potentially dangerous ‘URL file outbreak’ that distribute the Quant Loader Trojan, which in turn can distribute ransomware and password stealers.

Attackers are using a combination of phishing emails, social engineering, obfuscation, and a known exploit to distribute the Trojan.

According to Barracuda researchers, the threat seems to be distributed by emails disguised as billing documents, which started circulating last month. The emails contain attachments of zipped Microsoft internet shortcut files with a ‘.url’ file extension.

Researchers explain: “In the world of email, an unfamiliar file extension—especially one that is compressed alone in a ZIP file—is often a sure sign of a new malware outbreak.”

“These shortcut files use a variation on the CVE-2016-3353 proof-of-concept, containing links to JavaScript files (and more recently Windows Script Files). However, in this instance the URL was prefixed with "file://" rather than "http://" which fetches them over Samba rather than through a web browser.”

“This has the benefit of executing the contained code using WScript under the current user's profile rather than requiring browser exploitation, although it does prompt the user before doing so. The remote script files are heavily obfuscated, but all result in downloading and running Quant Loader when allowed to execute.”

Quant Loader is widely sold on underground forums and contains a management panel that allows attackers to configure any payloads they want to deliver. Researchers say configurable malware like this Trojan is becoming more common, separating malware development from distribution.

“The campaign itself has been composed of a number of mini-campaigns—each lasting for a less than a day. They are utilizing an email content and file name pattern (with some emails having no text content and only a subject line), a single domain serving malicious script files over Samba, and a single variant of Quant being distributed from a handful of domains,” they explain.

While the Samba shares are still active and publicly accessible, access is proving difficult.

“Attempting to access the URLs via HTTP has led to redirects at times, resulting in a random key generator file to be downloaded. Fortunately, these are generally flagged as malicious by most antivirus software. Based on the research we’ve done tracking this campaign—it isn’t showing up daily, but has shown up numerous times in March and April.”

Barracuda researchers say that users should avoid file types they are unfamiliar with, particularly when they are included in emails. “Certainly don't allow scripts to run that originated from files in email as well.”

How to stay safe when shopping online
Online shopping is a great way to avoid the crowds – but there are risks.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.
SailPoint releases first identity annual report
SailPoint’s research found that many organisations are lacking maturity in their governance processes over identities.
Disruption in the supply chain: Why IT resilience is a collective responsibility
"A truly resilient organisation will invest in building strong relationships while the sun shines so they can draw on goodwill when it rains."
Businesses too slow on attack detection – CrowdStrike
The 2018 CrowdStrike Services Cyber Intrusion Casebook reveals IR strategies, lessons learned, and trends derived from more than 200 cases.