General

  • Target

    lhuft.exe

  • Size

    717KB

  • Sample

    200109-pvvhk66ab2

  • MD5

    fb95f25c5c1b96f226c78f614509f1f7

  • SHA1

    e43db8ac3015dd16a9a74eed6642b9b85dfd1c92

  • SHA256

    7f90029d8bb4d49d1001a65f4d139f1a2b630b420e5caf4315e5d3da43d603b2

  • SHA512

    ae1c4c93dc5ad50a9a3d7a5d70ef3ab405f8f6b936b56324034329318699124c746a6440fdd61f1df4531e86fc67f4f243e772fc2df7f70947eca6f1d7fecfe2

Malware Config

Extracted

Family

qakbot

Campaign

1577715876

C2

80.14.209.42:2222

207.237.1.152:443

74.96.151.6:443

137.99.224.198:443

172.221.45.151:443

71.30.56.170:443

184.191.62.78:443

73.195.20.237:443

173.3.132.17:995

71.88.220.181:443

64.19.74.29:995

47.23.101.26:465

208.126.142.17:443

66.214.75.176:443

75.97.151.96:995

45.45.105.94:995

71.226.140.73:443

45.45.105.94:443

24.229.245.124:995

76.180.69.236:443

Targets

    • Target

      lhuft.exe

    • Size

      717KB

    • MD5

      fb95f25c5c1b96f226c78f614509f1f7

    • SHA1

      e43db8ac3015dd16a9a74eed6642b9b85dfd1c92

    • SHA256

      7f90029d8bb4d49d1001a65f4d139f1a2b630b420e5caf4315e5d3da43d603b2

    • SHA512

      ae1c4c93dc5ad50a9a3d7a5d70ef3ab405f8f6b936b56324034329318699124c746a6440fdd61f1df4531e86fc67f4f243e772fc2df7f70947eca6f1d7fecfe2

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities

    • Windows security bypass

    • Executes dropped EXE

    • Turn off Windows Defender SpyNet reporting

    • Loads dropped DLL

    • Adds Run entry to start application

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Disabling Security Tools

1
T1089

Modify Registry

2
T1112

Discovery

Remote System Discovery

1
T1018

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks