A previously undocumented remote access Trojan (RAT) called FlawedAmmyy has been discovered as the payload in two massive email campaigns this week.
Proofpoint researchers discovered that the RAT has actually been used since the beginning of 2016 in both highly targeted email attacks and massive, multi-million message campaigns. Narrow attacks targeted the automotive industry, among others, while the large, malicious spam campaigns appear to be associated with threat actor TA505, an actor responsible for many large-scale attacks using
Dridex, Locky and GlobeImposter, among others, over the last four years.
In the most recent campaigns, on March 5 and 6, email messages containing zipped URL attachments were sent from addresses spoofing the recipient’s own domain, with subjects such as “Receipt No” with random digits following, with matching attachments.
The URL files are interpreted by Microsoft Windows as internet shortcut files, but when clicked, they download and execute a JavaScript file over the Server Message Block (SMB) protocol; the JavaScript file in turn downloads Quant Loader and then FlawedAmmyy RAT as the final payload.
The FlawedAmmyy RAT also appeared on March 1 in a narrowly targeted attack.