General

  • Target

    document-1220302043.xls

  • Size

    89KB

  • Sample

    210219-rkxj6d37k6

  • MD5

    f5ab73fce5791889d025ffe96cb7da34

  • SHA1

    01e9b0107095b88a73d66bd1eccb7ad318fe7b75

  • SHA256

    095dd24006435241df2f18e24e7227a6285f0f2c935e97712fbea0c5af22f61d

  • SHA512

    8a42795a726b855dd280da10b5b38a480f7ec8b29875880d95aada5f02a67af4034efaebb574c2427baeb86028e9202b6f491ff9927868051c7eb17f55f90818

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://shrisaividhyasharam.in/ds/1902.gif

Extracted

Family

qakbot

Botnet

tr

Campaign

1613385567

C2

78.63.226.32:443

197.51.82.72:443

193.248.221.184:2222

95.77.223.148:443

71.199.192.62:443

77.211.30.202:995

80.227.5.69:443

77.27.204.204:995

81.97.154.100:443

173.184.119.153:995

38.92.225.121:443

81.150.181.168:2222

90.65.236.181:2222

83.110.103.152:443

73.153.211.227:443

188.25.63.105:443

89.137.211.239:995

202.188.138.162:443

98.173.34.212:995

87.202.87.210:2222

Targets

    • Target

      document-1220302043.xls

    • Size

      89KB

    • MD5

      f5ab73fce5791889d025ffe96cb7da34

    • SHA1

      01e9b0107095b88a73d66bd1eccb7ad318fe7b75

    • SHA256

      095dd24006435241df2f18e24e7227a6285f0f2c935e97712fbea0c5af22f61d

    • SHA512

      8a42795a726b855dd280da10b5b38a480f7ec8b29875880d95aada5f02a67af4034efaebb574c2427baeb86028e9202b6f491ff9927868051c7eb17f55f90818

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks