General

  • Target

    63deda6fe8af221a650f6ba6a2ee6c7fec17f10bc5e063c9b0aaee4981a01150 (1).zip

  • Size

    618KB

  • Sample

    210921-qkxrbsccbl

  • MD5

    f72a803e44f7ab1ec00fbba9488140c0

  • SHA1

    e62e67eadd5bc8b53cc6b286b23eb105d6297e83

  • SHA256

    fedc97aec0e9ba7ad16daa9540b196200b7b0d67e079ee3964c8882742716a32

  • SHA512

    c70392265832a917c402736bba7122d891019e3dafd9ca5838a6f9d079adf6acf3b9cf5699e96bf7f98315a174e8cc291a3c6a05ed8f54a4a846252606a54a9d

Malware Config

Extracted

Family

qakbot

Version

402.318

Botnet

obama100

Campaign

1632151873

C2

45.46.53.140:2222

144.139.47.206:443

189.210.115.207:443

120.150.218.241:995

47.22.148.6:443

140.82.49.12:443

24.139.72.117:443

24.229.150.54:995

24.55.112.61:443

136.232.34.70:443

95.77.223.148:443

173.21.10.71:2222

76.25.142.196:443

96.37.113.36:993

71.74.12.34:443

73.151.236.31:443

67.165.206.193:993

109.12.111.14:443

68.204.7.158:443

105.198.236.99:443

Targets

    • Target

      63deda6fe8af221a650f6ba6a2ee6c7fec17f10bc5e063c9b0aaee4981a01150.dll

    • Size

      823KB

    • MD5

      a372400cbff205def639e4db62ef17b4

    • SHA1

      445447a8cd34df42d7fd786a164389cf8e5f82db

    • SHA256

      63deda6fe8af221a650f6ba6a2ee6c7fec17f10bc5e063c9b0aaee4981a01150

    • SHA512

      763807749271cf66fa935b4da272ede62543971e124680381af5f22dd20d48d7f297dfcfb441ad3e56b96902129428d925b89e37ebc745b62d641fe7802b5457

    • Modifies system executable filetype association

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Registers COM server for autorun

    • Executes dropped EXE

    • Loads dropped DLL

    • Adds Run key to start application

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

2
T1060

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Tasks