General

  • Target

    Fedex_30470_11242020.xls

  • Size

    61KB

  • Sample

    201126-pate6a36r6

  • MD5

    b1073c53d1ade04d034805f6584b2dfb

  • SHA1

    a612eba63d014eae2f7a370b56180f46299ab6a1

  • SHA256

    a390df73b5c61444c493b1e5285b4067c5ac8a9a08bfeb90f5bec9e88f741ebb

  • SHA512

    91122bfff6ad1994e951321a8fc2aef9c98585acdfbae29144b26f6acf079db0a6ab38d81f2333b72a1ececaf8d142f28d193d026871fea48ae1d28a2607c581

Malware Config

Extracted

Family

qakbot

Botnet

abc101

Campaign

1606331967

C2

76.104.230.174:443

187.227.86.129:995

219.255.28.241:443

78.184.6.94:443

95.159.45.82:443

91.228.36.95:443

79.115.215.125:443

24.244.161.36:443

24.71.28.247:443

73.239.229.107:995

187.153.119.36:443

190.75.167.44:2222

83.110.111.159:443

174.76.21.134:443

75.109.180.221:443

85.122.141.42:995

156.222.6.246:995

188.24.183.193:443

88.106.237.152:2222

79.166.83.103:2222

Targets

    • Target

      Fedex_30470_11242020.xls

    • Size

      61KB

    • MD5

      b1073c53d1ade04d034805f6584b2dfb

    • SHA1

      a612eba63d014eae2f7a370b56180f46299ab6a1

    • SHA256

      a390df73b5c61444c493b1e5285b4067c5ac8a9a08bfeb90f5bec9e88f741ebb

    • SHA512

      91122bfff6ad1994e951321a8fc2aef9c98585acdfbae29144b26f6acf079db0a6ab38d81f2333b72a1ececaf8d142f28d193d026871fea48ae1d28a2607c581

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks