'URL file outbreak' used to distribute Quant Loader Trojan
Barracuda Networks is tracking a potentially dangerous ‘URL file outbreak’ that distribute the Quant Loader Trojan, which in turn can distribute ransomware and password stealers.
Attackers are using a combination of phishing emails, social engineering, obfuscation, and a known exploit to distribute the Trojan.
According to Barracuda researchers, the threat seems to be distributed by emails disguised as billing documents, which started circulating last month. The emails contain attachments of zipped Microsoft internet shortcut files with a ‘.url’ file extension.
Researchers explain: “In the world of email, an unfamiliar file extension—especially one that is compressed alone in a ZIP file—is often a sure sign of a new malware outbreak.”
“This has the benefit of executing the contained code using WScript under the current user's profile rather than requiring browser exploitation, although it does prompt the user before doing so. The remote script files are heavily obfuscated, but all result in downloading and running Quant Loader when allowed to execute.”
Quant Loader is widely sold on underground forums and contains a management panel that allows attackers to configure any payloads they want to deliver. Researchers say configurable malware like this Trojan is becoming more common, separating malware development from distribution.
“The campaign itself has been composed of a number of mini-campaigns—each lasting for a less than a day. They are utilizing an email content and file name pattern (with some emails having no text content and only a subject line), a single domain serving malicious script files over Samba, and a single variant of Quant being distributed from a handful of domains,” they explain.
While the Samba shares are still active and publicly accessible, access is proving difficult.
“Attempting to access the URLs via HTTP has led to redirects at times, resulting in a random key generator file to be downloaded. Fortunately, these are generally flagged as malicious by most antivirus software. Based on the research we’ve done tracking this campaign—it isn’t showing up daily, but has shown up numerous times in March and April.”
Barracuda researchers say that users should avoid file types they are unfamiliar with, particularly when they are included in emails. “Certainly don't allow scripts to run that originated from files in email as well.”