General

  • Target

    MXoye8l.z2Xb.i8.js

  • Size

    118KB

  • Sample

    220909-qphszagbg5

  • MD5

    2eb17caa422a2097364e6fcb9c4251dd

  • SHA1

    fba2528723a42314600bf4a10496ae840fa475e2

  • SHA256

    182bb1afe6562279ccb29e3ec6e1aa15caf7ac62c1b25a75f6981887637550a7

  • SHA512

    3ece1c441ae3878cb220e416e0ee8b9ac88ea1bfeb1bf247cb0336d4d40e70afc18f1b4124c5d0ca3c5ab85cc4460e2457c67ff00543fc2619056571ad67a09c

  • SSDEEP

    3072:DYAInlJ7Mb5z4Wh5q8RHzgaDFc2PeJjt:DYAIlJolz4W/bJDWWeJjt

Malware Config

Extracted

Family

qakbot

Version

403.860

Botnet

BB

Campaign

1662650043

C2

191.97.234.238:995

81.131.161.131:2078

197.94.210.133:443

193.3.19.37:443

70.51.153.182:2222

99.232.140.205:2222

123.240.131.1:443

177.102.84.28:32101

105.156.152.227:443

190.59.247.136:995

89.211.218.88:2222

81.214.220.237:443

85.99.62.74:443

217.165.68.122:993

219.69.103.199:443

37.210.148.30:995

64.207.215.69:443

113.169.57.104:443

179.225.221.169:32101

151.234.94.35:990

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Targets

    • Target

      MXoye8l.z2Xb.i8.js

    • Size

      118KB

    • MD5

      2eb17caa422a2097364e6fcb9c4251dd

    • SHA1

      fba2528723a42314600bf4a10496ae840fa475e2

    • SHA256

      182bb1afe6562279ccb29e3ec6e1aa15caf7ac62c1b25a75f6981887637550a7

    • SHA512

      3ece1c441ae3878cb220e416e0ee8b9ac88ea1bfeb1bf247cb0336d4d40e70afc18f1b4124c5d0ca3c5ab85cc4460e2457c67ff00543fc2619056571ad67a09c

    • SSDEEP

      3072:DYAInlJ7Mb5z4Wh5q8RHzgaDFc2PeJjt:DYAIlJolz4W/bJDWWeJjt

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Loads dropped DLL

    • Drops file in System32 directory

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Remote System Discovery

1
T1018

Tasks