General

  • Target

    Document_314379760-Copy.xls

  • Size

    59KB

  • Sample

    201216-jkdgls5s8n

  • MD5

    24e2b1dc895e185efb45e60cda15abbf

  • SHA1

    6e49f02ddab975d859f401d4ea59fb6fec37ce7f

  • SHA256

    d92c94030dca29964cb4e5cd8a31c6fc73ce0b0e01734450aed7e3327f132e78

  • SHA512

    93b0f7cb2c948123b7bd13db860b891686522a0bbc16890a6cbfcff1a4b0c91475f56d2b079612bd75daec415cf42688f82d202509533b3512cd4c80b7911b3e

Malware Config

Extracted

Family

qakbot

Botnet

abc110

Campaign

1607524278

C2

78.63.226.32:443

72.252.201.69:443

68.190.152.98:443

72.240.200.181:2222

216.137.142.200:2222

87.27.110.90:2222

94.69.242.254:2222

189.183.209.211:443

94.26.119.221:443

186.189.208.238:443

161.199.180.159:443

197.45.110.165:995

83.110.221.218:443

105.198.236.99:443

83.110.158.22:2222

24.37.178.158:443

185.105.131.233:443

79.101.206.250:995

92.154.83.96:2078

83.202.68.220:2222

Targets

    • Target

      Document_314379760-Copy.xls

    • Size

      59KB

    • MD5

      24e2b1dc895e185efb45e60cda15abbf

    • SHA1

      6e49f02ddab975d859f401d4ea59fb6fec37ce7f

    • SHA256

      d92c94030dca29964cb4e5cd8a31c6fc73ce0b0e01734450aed7e3327f132e78

    • SHA512

      93b0f7cb2c948123b7bd13db860b891686522a0bbc16890a6cbfcff1a4b0c91475f56d2b079612bd75daec415cf42688f82d202509533b3512cd4c80b7911b3e

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • ServiceHost packer

      Detects ServiceHost packer used for .NET malware

    • Loads dropped DLL

    • Process spawned suspicious child process

      This child process is typically not spawned unless (for example) the parent process crashes. This typically indicates the parent process was unsuccessfully compromised.

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks