General

  • Target

    document-1087888573.xls

  • Size

    315KB

  • Sample

    210219-tslw1lhjvj

  • MD5

    0d16e6e549190be8fa9203dbdb49a86c

  • SHA1

    290482b1d71993fbf1b78faa193b4babafb16b89

  • SHA256

    adb1792503545b345fb3c79a4c490a5e27de7b13bca2de9fcea8941d239ae3cb

  • SHA512

    9d2cbb8ddbf8858882e40efba08063ff7fa6953795f2fd25a4cd3c53a56215074d65b492fc53c34b8e1aa06cb58cca763dcdf2bea5a69c2800c66ae3963f4ab4

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://intellectsmart.in/ds/1702.gif

Extracted

Family

qakbot

Botnet

tr

Campaign

1613385567

C2

78.63.226.32:443

197.51.82.72:443

193.248.221.184:2222

95.77.223.148:443

71.199.192.62:443

77.211.30.202:995

80.227.5.69:443

77.27.204.204:995

81.97.154.100:443

173.184.119.153:995

38.92.225.121:443

81.150.181.168:2222

90.65.236.181:2222

83.110.103.152:443

73.153.211.227:443

188.25.63.105:443

89.137.211.239:995

202.188.138.162:443

98.173.34.212:995

87.202.87.210:2222

Targets

    • Target

      document-1087888573.xls

    • Size

      315KB

    • MD5

      0d16e6e549190be8fa9203dbdb49a86c

    • SHA1

      290482b1d71993fbf1b78faa193b4babafb16b89

    • SHA256

      adb1792503545b345fb3c79a4c490a5e27de7b13bca2de9fcea8941d239ae3cb

    • SHA512

      9d2cbb8ddbf8858882e40efba08063ff7fa6953795f2fd25a4cd3c53a56215074d65b492fc53c34b8e1aa06cb58cca763dcdf2bea5a69c2800c66ae3963f4ab4

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks