General

  • Target

    qb.xls

  • Size

    67KB

  • Sample

    210203-cf4stc4f9e

  • MD5

    c9a898c5a3270a8afe2c5be7a1cda7d3

  • SHA1

    8fcdd739624c60795d18d0f2d769f70ffcaf04a3

  • SHA256

    e3154af64e8c0979c27748c4c445b3fff752188c780a46b98f4fdb96b028c85d

  • SHA512

    50e3b721b3d715ce6b3c3d85b34c127f81cf2f32654d7d59bf054b944b39578231279c2308106f36ee27235bd3a5d4595d786b8c90f7049ffab92d9bad970161

Malware Config

Extracted

Family

qakbot

Botnet

abc123

Campaign

1612275762

C2

196.151.252.84:443

216.201.162.158:443

83.110.12.140:2222

105.186.102.16:443

108.31.15.10:995

193.248.221.184:2222

68.225.60.77:995

197.45.110.165:995

89.3.198.238:443

81.97.154.100:443

81.214.126.173:2222

108.46.145.30:443

71.187.170.235:443

72.240.200.181:2222

81.88.254.62:443

98.240.24.57:443

86.97.8.249:443

75.136.40.155:443

79.129.121.81:995

37.211.90.175:995

Targets

    • Target

      qb.xls

    • Size

      67KB

    • MD5

      c9a898c5a3270a8afe2c5be7a1cda7d3

    • SHA1

      8fcdd739624c60795d18d0f2d769f70ffcaf04a3

    • SHA256

      e3154af64e8c0979c27748c4c445b3fff752188c780a46b98f4fdb96b028c85d

    • SHA512

      50e3b721b3d715ce6b3c3d85b34c127f81cf2f32654d7d59bf054b944b39578231279c2308106f36ee27235bd3a5d4595d786b8c90f7049ffab92d9bad970161

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks