General

  • Target

    63deda6fe8af221a650f6ba6a2ee6c7fec17f10bc5e063c9b0aaee4981a01150.zip

  • Size

    618KB

  • Sample

    210921-p4tckscbhn

  • MD5

    f0061a9d11135cd89a62d3618226c32f

  • SHA1

    6a339b848443cd9335653ebbf4d9830c3ede1373

  • SHA256

    b28e6cbbd268a2793d9612eba3e3351d52cedd21ca16f71eeff6998a744a7542

  • SHA512

    c3f29077ddab66243f2b3c1ea700e8fa69ca9bcf2733fab24875861621c526f626430fda43866b67e6c838bd8fb74ec60d2fbb7b6ca5a3b24800d67784d00710

Malware Config

Extracted

Family

qakbot

Version

402.318

Botnet

obama100

Campaign

1632151873

C2

45.46.53.140:2222

144.139.47.206:443

189.210.115.207:443

120.150.218.241:995

47.22.148.6:443

140.82.49.12:443

24.139.72.117:443

24.229.150.54:995

24.55.112.61:443

136.232.34.70:443

95.77.223.148:443

173.21.10.71:2222

76.25.142.196:443

96.37.113.36:993

71.74.12.34:443

73.151.236.31:443

67.165.206.193:993

109.12.111.14:443

68.204.7.158:443

105.198.236.99:443

Targets

    • Target

      63deda6fe8af221a650f6ba6a2ee6c7fec17f10bc5e063c9b0aaee4981a01150.dll

    • Size

      823KB

    • MD5

      a372400cbff205def639e4db62ef17b4

    • SHA1

      445447a8cd34df42d7fd786a164389cf8e5f82db

    • SHA256

      63deda6fe8af221a650f6ba6a2ee6c7fec17f10bc5e063c9b0aaee4981a01150

    • SHA512

      763807749271cf66fa935b4da272ede62543971e124680381af5f22dd20d48d7f297dfcfb441ad3e56b96902129428d925b89e37ebc745b62d641fe7802b5457

    • Modifies system executable filetype association

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Registers COM server for autorun

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

2
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks