General

  • Target

    1755e3f11115ab622f5f791a7e9edd84db4a99ce8f4eb76eb3e3ece910c6f702

  • Size

    821KB

  • Sample

    220201-j24gwabgf8

  • MD5

    7b92d9b8da680f686a1a8c3b06cdc936

  • SHA1

    aaecc58409d6c60ba4ee83c4446f2082814e2aed

  • SHA256

    1755e3f11115ab622f5f791a7e9edd84db4a99ce8f4eb76eb3e3ece910c6f702

  • SHA512

    c1de52fd6abb96d69d315f5c1761f534004191f4563e3e9c9b5127142b8758fb110409002a988602e6641123f8bab6fb9589b5f58e444ea4b726dd88355267ec

Malware Config

Extracted

Family

qakbot

Version

324.65

Botnet

spx82

Campaign

1584449336

C2

98.213.28.175:443

72.209.191.27:443

100.37.33.10:443

70.62.160.186:6883

104.152.16.45:995

68.174.15.223:443

24.99.180.247:443

72.218.167.183:995

71.77.252.14:2222

104.34.122.18:443

176.205.145.81:995

73.163.242.114:443

73.214.231.2:443

83.66.111.85:443

35.142.24.147:2222

67.250.184.157:443

41.228.55.118:443

65.131.79.162:995

137.99.224.198:443

100.33.132.135:443

Targets

    • Target

      1755e3f11115ab622f5f791a7e9edd84db4a99ce8f4eb76eb3e3ece910c6f702

    • Size

      821KB

    • MD5

      7b92d9b8da680f686a1a8c3b06cdc936

    • SHA1

      aaecc58409d6c60ba4ee83c4446f2082814e2aed

    • SHA256

      1755e3f11115ab622f5f791a7e9edd84db4a99ce8f4eb76eb3e3ece910c6f702

    • SHA512

      c1de52fd6abb96d69d315f5c1761f534004191f4563e3e9c9b5127142b8758fb110409002a988602e6641123f8bab6fb9589b5f58e444ea4b726dd88355267ec

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Remote System Discovery

1
T1018

Tasks