General

  • Target

    9df7a3623d4f644a024600fce6aa5e4288f3814a2b0e3f0b47503d15aae61807

  • Size

    196KB

  • Sample

    220214-ss47gsbbdj

  • MD5

    6aceaba67cd333850247757be9d5bec6

  • SHA1

    42b4793481f033b55e9ffc131d1cb23f79488bf7

  • SHA256

    9df7a3623d4f644a024600fce6aa5e4288f3814a2b0e3f0b47503d15aae61807

  • SHA512

    ffb9373b3a63604613ae9afca420f7fcbb685a804efa6bdcd0f9720e41bb9f27be49af27eef6fa12662a2c1a2929a4cdb02d782ba18520ba8822b1adea4fc4b4

Malware Config

Extracted

Family

qakbot

Version

401.138

Botnet

abc114

Campaign

1608129413

C2

86.127.22.190:443

35.139.242.207:443

108.190.194.146:2222

187.213.199.54:443

68.83.89.188:443

41.233.152.232:993

196.151.252.84:443

181.208.249.141:443

172.87.134.226:443

96.27.47.70:2222

83.110.109.78:2222

93.86.1.159:995

217.162.149.212:443

80.11.210.247:443

72.252.201.69:443

185.163.221.77:2222

189.62.175.92:22

95.76.27.6:443

45.77.115.208:443

187.213.82.104:995

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Targets

    • Target

      9df7a3623d4f644a024600fce6aa5e4288f3814a2b0e3f0b47503d15aae61807

    • Size

      196KB

    • MD5

      6aceaba67cd333850247757be9d5bec6

    • SHA1

      42b4793481f033b55e9ffc131d1cb23f79488bf7

    • SHA256

      9df7a3623d4f644a024600fce6aa5e4288f3814a2b0e3f0b47503d15aae61807

    • SHA512

      ffb9373b3a63604613ae9afca420f7fcbb685a804efa6bdcd0f9720e41bb9f27be49af27eef6fa12662a2c1a2929a4cdb02d782ba18520ba8822b1adea4fc4b4

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

3
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

3
T1082

Tasks