Skip to main content

Quantloader Tracker


Quantloader C2i

The C2i published in these lists are extracted from the malicious binaries. These executables are the Quantloader malware.
You can use this information to create block-lists. All C2i published here is active at the time of publishing but some of these C2s can go offline at any time after that. All information provided here is free to use.
C2i published on this site could cause some FPs as these IPs/URIs get recycled frequently, you agree to that before using any C2i from this site.

Lists are NOT deduped. 

Updated: 27 Dec 19

hxxps://bdns.at:80/r/biberonata.bit
hxxp://gcarpentryg.com/1eleqemmygaidtiodraoc.exe
hxxp://gogopop.ru/q123456p/index.php?id=43891195&c=1&mk=797ae8&il=h&vr=1.54&bt=32
hxxp://185.70.186.146/qq/index.php?id=34091500&c=1&mk=b06c6d&il=H&vr=1.42&bt=32

Downloaded files:

b590755cd6fa8ab3d6c5a8702fa41249d3361749b0a0609dc4c0383c76ad5358,
2f7672b04eb7ec082067f4943d6a9fe21720e7ed4d613ef1932c8eb18b80dd3e,
332758e907c5e42be4e02d65d232898f64534dfd82788ff40eb2d4686b8f0e69,
3991a1023ec29d45af71f377e754593fbb065bfbac1e8d588e80fdc1bbdcba02,
45bd24b4a4d03d72d6bf066e4f13da5527e6733488025cb0ede0384ad29286bb,
de4e1d6dc3464c05c3ccddd50ad5548fa6be1c844785157d85120853a00b2363,
42c97a2dc96c5c8ee9693e7471ab0a0eb9000c93bed0ac544cac3d77fb08ffb6,
d8b38e3face06a644d8b26f5103d9fd92aab038608ff50f9c5de309bedd163bc,
dd2379922a26e7a5b66a866624e0811e3f66890550a87c8fc6329b67cc90b63e,
b709a9bf95ef1ea294e33db2b9f3fcfbf51eaee1a41646a4e03ad797b8222d54
8c8c666a249c9ae5744fdcb71061212776d01820696165736b336bb38fbe6831,
25094a5f66980ef4696f7a11b5da65fe75ad9d840787ea273bb6dfc6dc851727,
00ca7e9e61a3ceaa4b9250866aface8af63e5ae71435d4fd6c770a8c9a167f22,
e9474a23034333819f9cbfa03ead092e07c5a4fafbae80ff1994ce5f00201b96,
25e821a4147c05ab9370706a5ebd7f9e6907191579c0f8463cb34237c3f0eedb,
b0c173e0fc28e0f1bc8debfe49de01f306d372a0516d88201b87e441f3de303e,
7a4101178accec8dc269942ddc5f7048b2c1a925fbd2afe15cd1cb21ad9d6b81,
8e6f42597583744806443b4e883ce54e1606a7ceab286f3116b17619e5c5a653,
a38f5dc74563821ec06144e7804ccfcf8fb8653a0e11e63fdc6e3b068226a4d5,
5d868456bb99e59a07c38ed383a11460c19a93703a39c9214eeb91e112a0108d

Updated: 18 Dec 19

hxxp://vitaetortorvitaesuscipit[.]us
hxxp://naturalherbaltherapy[.]kz/
hxxp://healtyleavingfamily[.]kz
hxxp://s-p-y[.]ml
hxxp://filmsdays[.]top
hxxp://kinnomanna[.]top
hxxp://80[.]87[.]199[.]186
hxxp://coffeecornerss[.]com
hxxp://dogpounding[.]com/
hxxp://straighthoods[.]com
hxxp://191[.]96[.]249[.]69/
hxxp://port[.]so[.]tl
hxxp://user6097[.]com/

Comments

Popular posts from this blog

Major update: Emotet C2i Apr 2019

Emotet has updated the C2 comms in the latest release, going for URIs instead of IPs (root). Here’s a complete list of the current campaign: Emotet C2i: http://51.255.50.164:8080/window/child/ringin/ http://109.104.79.48:8080/cookies/tlb/ http://92.48.118.27:8080/rtm/pnp/ http://197.248.67.226:8080/enabled/forced/ http://181.170.93.38:8080/teapot/balloon/ http://69.163.33.82:8080/glitch/scripts/arizona/ http://192.155.90.90:7080/prov/odbc/arizona/ http://43.229.62.186:8080/teapot/ http://72.47.248.48:8080/sess/cone/ http://209.159.244.240:443/publish/vermont/tlb/ http://197.248.67.226:8080/codec/between/tlb/ http://176.58.93.123:8080/splash/ http://72.47.248.48:8080/sess/glitch/entries/ http://181.170.93.38:8080/schema/free/ http://69.163.33.82:8080/badge/symbols/results/ http://109.73.52.242:8080/results/prov/ http://68.191.37.107/iplk/vermont/sym/merge/ http://154.120.228.126:8080/xian/enabled/sym/merge/ http://136.49.87.106/usbccid/taskbar/enabled/ http://5.9.128.163:8080/json

Grinju Downloader: Anti-analysis (on steroids) | Part 2

  This malware takes anti-analysis and stealth techniques to a new level We took a look at this malware in the Part 1 of this publication. Now let’s carry on with the analysis and dig deeper into the various anti-analysis and stealth-exec features of this malware in Part2. Malpedia Inventory: https://malpedia.caad.fkie.fraunhofer.de/details/vbs.grinju Secondary Macro Code First of all, here’s the entire code that is dumped in the sheet once all the macro functions have been completed. Take a look at these lines and try to figure out what they are meant to do. Then we’ll take a look at the most important of these briefly before moving on to the next section. =CLOSE(FALSE) =FORMULA(LEN(APP.MAXIMIZE())+-459,Sheet1!R18690C129) =FORMULA(LEN(GET.WINDOW(7))+-131,Sheet1!R18691C129) =FORMULA(LEN(GET.WINDOW(20))+-893,Sheet1!R18692C129) =FORMULA(LEN(GET.WINDOW(23)=3)+433,Sheet1!R18693C129) =FORMULA(LEN(GET.WORKSPACE(31))+864,Sheet1!R18694C129) =FORMULA(LEN(GET.WORKSPACE(13)>770)+707,Sheet1!R18

Grinju Downloader: Anti-analysis (on steroids) | Part 1

  This malware takes anti-analysis and stealth techniques to a new level Malpedia Inventory: https://malpedia.caad.fkie.fraunhofer.de/details/vbs.grinju I’ve come across some great anti-analysis code in malware over the years. This one takes the top spot. On that note, let’s get into it, this is a long one! Since this malware employs a very complex structure, I’ve decided to divide the analysis into different sections. I’ll try to keep it as simple as possible but having said that, it really is a very complicated project. Hence, publishing in parts. TLDR: This is a very well-thought and equally well-written malware. There’s no VBA that you can analyse. The values and formulas that are used are spread across the worksheets to thousands of rows. The functions, among other things, are used to close the file, corrupt it and also delete the dropped scripts to make analysis extremely hard. In fact, you cannot analyse this malware without altering the code it self. Along the way, you’ll also