General

  • Target

    14e67e12608076bb89a929fda166f836ded6b624ac02537d4e767c773207e2a5

  • Size

    2.9MB

  • Sample

    220215-mygqgseae6

  • MD5

    854e2657eb38abc80bba7df52967ab5f

  • SHA1

    583cd5268e8df7e7fd34fb9b72ca4cd2e8ba743b

  • SHA256

    14e67e12608076bb89a929fda166f836ded6b624ac02537d4e767c773207e2a5

  • SHA512

    529266f08a2d5d9bd453b150be7a75c4f32239ccb31e8bd59b89ee18332d1bcc87e4a72fdae262feffab2946c9fa6d80a922cd2869e0eba31fa3dfb6be7dd965

Malware Config

Extracted

Family

qakbot

Version

401.29

Botnet

abc101

Campaign

1606331967

C2

76.104.230.174:443

187.227.86.129:995

219.255.28.241:443

78.184.6.94:443

95.159.45.82:443

91.228.36.95:443

79.115.215.125:443

24.244.161.36:443

24.71.28.247:443

73.239.229.107:995

187.153.119.36:443

190.75.167.44:2222

83.110.111.159:443

174.76.21.134:443

75.109.180.221:443

85.122.141.42:995

156.222.6.246:995

188.24.183.193:443

88.106.237.152:2222

79.166.83.103:2222

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Targets

    • Target

      14e67e12608076bb89a929fda166f836ded6b624ac02537d4e767c773207e2a5

    • Size

      2.9MB

    • MD5

      854e2657eb38abc80bba7df52967ab5f

    • SHA1

      583cd5268e8df7e7fd34fb9b72ca4cd2e8ba743b

    • SHA256

      14e67e12608076bb89a929fda166f836ded6b624ac02537d4e767c773207e2a5

    • SHA512

      529266f08a2d5d9bd453b150be7a75c4f32239ccb31e8bd59b89ee18332d1bcc87e4a72fdae262feffab2946c9fa6d80a922cd2869e0eba31fa3dfb6be7dd965

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Suspicious use of NtCreateProcessExOtherParentProcess

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks