Analysis

  • max time kernel
    151s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    07-06-2023 15:02

General

  • Target

    qbot.bat

  • Size

    26B

  • MD5

    2aabd1a3d885eaf151f9fc101ea1caab

  • SHA1

    6fcf6a07c0f9a23826bab9fd4da093ed4757019c

  • SHA256

    9ae4c3b9e654237f9d62c93dbd242ed64abe72451e7d142724bfea801cd6c4de

  • SHA512

    9df02859f59a52d216f80b9627bf6d43eac8762120701625d39ef52bed7343d4b32b9596070533593f7eeecd5f134d8dfbe14117ea6ea9378908cbf4692b8da0

Malware Config

Extracted

Family

qakbot

Version

404.1358

Botnet

obama267

Campaign

1686127648

C2

161.142.100.114:995

116.75.63.15:443

125.99.76.102:443

93.187.148.45:443

79.168.224.165:2222

31.53.29.216:2222

103.123.223.133:443

62.35.230.21:995

124.149.143.189:2222

109.50.149.241:2222

86.222.101.244:2222

45.62.70.33:443

24.234.220.88:995

201.244.108.183:995

190.75.134.240:2222

103.212.19.254:995

184.182.66.109:443

64.121.161.102:443

178.175.187.254:443

94.59.123.30:2222

Signatures

  • Qakbot/Qbot

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\qbot.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:884
    • C:\Windows\system32\rundll32.exe
      rundll32.exe qbot.dll,menu
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe qbot.dll,menu
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:1752
        • C:\Windows\SysWOW64\wermgr.exe
          C:\Windows\SysWOW64\wermgr.exe
          4⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:1740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1740-60-0x00000000000F0000-0x00000000000F2000-memory.dmp

    Filesize

    8KB

  • memory/1740-61-0x00000000000C0000-0x00000000000E4000-memory.dmp

    Filesize

    144KB

  • memory/1740-67-0x00000000000C0000-0x00000000000E4000-memory.dmp

    Filesize

    144KB

  • memory/1740-68-0x00000000000C0000-0x00000000000E4000-memory.dmp

    Filesize

    144KB

  • memory/1740-69-0x00000000000C0000-0x00000000000E4000-memory.dmp

    Filesize

    144KB

  • memory/1740-70-0x00000000000C0000-0x00000000000E4000-memory.dmp

    Filesize

    144KB

  • memory/1740-71-0x00000000000C0000-0x00000000000E4000-memory.dmp

    Filesize

    144KB

  • memory/1752-54-0x0000000000130000-0x0000000000133000-memory.dmp

    Filesize

    12KB

  • memory/1752-55-0x00000000001E0000-0x0000000000204000-memory.dmp

    Filesize

    144KB