General

  • Target

    3ed017f9cbabcb88264424a733db757e7e2bca9074ff3dc4b0e7249a54d5becc

  • Size

    821KB

  • Sample

    220201-h57s2abcb3

  • MD5

    6520d05f3784837cbc1063d463be8355

  • SHA1

    d02872d8e25774674103cf78cbfbbb2bc8755aa3

  • SHA256

    3ed017f9cbabcb88264424a733db757e7e2bca9074ff3dc4b0e7249a54d5becc

  • SHA512

    e9d54d155193c1d224b0fceb31f8666833cbc5915ccc868cf73cc4debe3636f160b03aec7f2a41c1d1b9a00eeee7a957fe30ae75fab5427e4140ac4104b8f5d1

Malware Config

Extracted

Family

qakbot

Version

324.65

Botnet

spx82

Campaign

1584449336

C2

98.213.28.175:443

72.209.191.27:443

100.37.33.10:443

70.62.160.186:6883

104.152.16.45:995

68.174.15.223:443

24.99.180.247:443

72.218.167.183:995

71.77.252.14:2222

104.34.122.18:443

176.205.145.81:995

73.163.242.114:443

73.214.231.2:443

83.66.111.85:443

35.142.24.147:2222

67.250.184.157:443

41.228.55.118:443

65.131.79.162:995

137.99.224.198:443

100.33.132.135:443

Targets

    • Target

      3ed017f9cbabcb88264424a733db757e7e2bca9074ff3dc4b0e7249a54d5becc

    • Size

      821KB

    • MD5

      6520d05f3784837cbc1063d463be8355

    • SHA1

      d02872d8e25774674103cf78cbfbbb2bc8755aa3

    • SHA256

      3ed017f9cbabcb88264424a733db757e7e2bca9074ff3dc4b0e7249a54d5becc

    • SHA512

      e9d54d155193c1d224b0fceb31f8666833cbc5915ccc868cf73cc4debe3636f160b03aec7f2a41c1d1b9a00eeee7a957fe30ae75fab5427e4140ac4104b8f5d1

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Remote System Discovery

1
T1018

Tasks