2018-07-17 - NECURS BOTNET MALSPAM USES .IQY FILES TO PUSH FLAWED AMMYY RAT
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
ASSOCIATED FILES:
- 2018-07-17-Necurs-Botnet-malspam-2-examples.zip 1.9 kB (1,867 bytes)
 - 2018-07-17-Necurs-Botnet-pushes-Flawed-Ammyy.pcap.zip 447 kB (446,718 bytes)
 - 2018-07-17-malware-from-Necurs-Botnet-Flawed-Ammyy-infection.zip 321 kB (320,630 bytes)
 
CHAIN OF EVENTS:
- malspam --> .iqy attachment --> Flawed Ammyy RAT
 
EMAILS
TWO MALSPAM EXAMPLES:
- Received: from 187-7-37-160.fnses700.ipd.brasiltelecom[.]net[.]br ([187.7.37[.]160])
 - Date/Time: 2018-07-17 15:28 UTC
 - From: Diann <diann.greenhalgh03@didgeridoo[.]es>
 - Subject: PDF_38995
 - Attachment: PDF_38995.iqy
 
- Received: from static-190-25-217-104.static.etb[.]net[.]co ([190.25.217[.]104])
 - Date/Time: 2018-07-17 15:28 UTC
 - From: Diann <diann.greenhalgh03@didgeridoo[.]es>
 - Subject: PDF_38995
 - Attachment: PDF_38995.iqy
 
TRAFFIC

Shown above:  Infection traffic filtered in Wirehshark.
TRAFFIC FROM AN INFECTED WINDOWS HOST:
- 169.239.129[.]23 port 80 - t99c[.]com - GET/A
 - 169.239.129[.]23 port 80 - t99c[.]com - GET/B
 - 169.239.129[.]23 port 80 - t99c[.]com - GET/donate
 - 185.99.132[.]128 port 443 - Flawed Ammyy post-infection traffic
 
MALWARE
ASSOCIATED MALWARE:
- SHA256 hash:  727ce79b953cdc1316fbb66decf8e3463dd0c59ac600b3fba77d1cefc35d9871
File size: 25 bytes
File name: PDF_38995.iqy
File description: Malspam attachment, Excel-based Internet Query (.iqy) file 
- SHA256 hash:  c2080983598643a2498d1f6ef3f1cc9dc58a784a69e3f313f18dc1b8e0afbc17
File size: 659,968 bytes
File location: C:\Users\[username]\AppData\Local\Temp\cls.exe
File description: Windows executable (.exe) file for Flawed Ammyy RAT 
Click here to return to the main page.
