General

  • Target

    Document_2039517850_12162020.xls

  • Size

    54KB

  • Sample

    201216-tg37zhq87e

  • MD5

    0ab5d82db3541b40b3ef56d03efe8a3f

  • SHA1

    e44e018503f87fa50b1ad1e7e56a3f4a3b56eff9

  • SHA256

    210468bf9c97e5bbae46e464625550d20079fb3766ad33d490f06e0cd037163a

  • SHA512

    2824970bfa09450f8266274e4da423b0c418289b033842402959886a8514d4564620a83b82af5217be88eeb088621826f816e0fa320b3c0a11dfc8493eaae1fa

Malware Config

Extracted

Family

qakbot

Botnet

abc114

Campaign

1608129413

C2

86.127.22.190:443

35.139.242.207:443

108.190.194.146:2222

187.213.199.54:443

68.83.89.188:443

41.233.152.232:993

196.151.252.84:443

181.208.249.141:443

172.87.134.226:443

96.27.47.70:2222

83.110.109.78:2222

93.86.1.159:995

217.162.149.212:443

80.11.210.247:443

72.252.201.69:443

185.163.221.77:2222

189.62.175.92:22

95.76.27.6:443

45.77.115.208:443

187.213.82.104:995

Targets

    • Target

      Document_2039517850_12162020.xls

    • Size

      54KB

    • MD5

      0ab5d82db3541b40b3ef56d03efe8a3f

    • SHA1

      e44e018503f87fa50b1ad1e7e56a3f4a3b56eff9

    • SHA256

      210468bf9c97e5bbae46e464625550d20079fb3766ad33d490f06e0cd037163a

    • SHA512

      2824970bfa09450f8266274e4da423b0c418289b033842402959886a8514d4564620a83b82af5217be88eeb088621826f816e0fa320b3c0a11dfc8493eaae1fa

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • CryptOne packer

      Detects CryptOne packer defined in NCC blogpost.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks