Advertisement
VRad

#qbot_131222

Dec 13th, 2022 (edited)
365
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.39 KB | None | 0 0
  1. #IOC #OptiData #VR #qakbot #qbot
  2.  
  3. https://pastebin.com/gR1iwSGn
  4.  
  5. previous_contact:
  6. 25/08/20 https://pastebin.com/2EgQnFjW
  7.  
  8. FAQ:
  9. https://malpedia.caad.fkie.fraunhofer.de/details/win.qakbot
  10. https://research.splunk.com/stories/qakbot/
  11.  
  12. attack_vector
  13. --------------
  14. email > SCAN_WE2280.html > attachment.zip [pwd] > SCAN_WE2280.img > SCAN_WE2280.LNK > cmd.exe /c YouNewRules\NewIssues.cmd > load NewInvoice.patch [DLL] > wermgr.exe > C2
  15.  
  16.  
  17. # # # # # # # #
  18. email_headers
  19. # # # # # # # #
  20. Received: from unknown (HELO omta033.useast.a.cloudfilter.net) ([44.202.169.32])
  21. Received: from eig-obgw-5010a.ext.cloudfilter.net ([10.0.29.199])
  22. Received: from gator2021.hostgator.com ([50.87.144.41]) by cmsmtp
  23. Received: from [24.53.62.209] (port=37501 helo=localhost) by gator2021.hostgator.com
  24. Subject: Re: журнали
  25. Date: Tue, 13 Dec 2022 00:15:44 +0300
  26. MIME-Version: 1.0
  27. X-Mailer: Microsoft Outlook 16.0
  28. X-Email-Count: 106
  29.  
  30. # # # # # # # #
  31. files
  32. # # # # # # # #
  33.  
  34. SHA-256 c2b17bc002f4db968e771b34a64e74c5cb04ace0e7b16d5cf18382b5e2ad45d4
  35. File name SCAN_WE2280.html [MITRE ATT&CK T1027.006]
  36. File size 1.38 MB (1442011 bytes)
  37.  
  38. SHA-256 fda7ee3a400614bda8238a61d0f93c883329cf9b8912873b2c60d8f5c9deaea0
  39. File name files.zip [ZIP, password = 057305]
  40. File size 425.95 KB (436176 bytes)
  41.  
  42. SHA-256 bc080013aff169586dc5efb00ec3a7296791412c72ac3705bfd439da6d14f420
  43. File name SCAN_WE2280.img [ISO 9660]
  44. File size 1.01 MB (1058816 bytes)
  45.  
  46. SHA-256 b286440ca1c5d399582c6595d787045293f121152a02e62f4dcd5c2cbc8ed0ca
  47. File name SCAN_WE2280.lnk [MS Windows shortcut]
  48. File size 2.57 KB (2635 bytes)
  49.  
  50. SHA-256 ceb2378fc315e19c299ee8e33b23340b19273d7b31470fc1cd433fd0825fc0a2
  51. File name Updates.txt [UTF-8 Unicode English text]
  52. File size 233.68 KB (239286 bytes)
  53.  
  54. SHA-256 6295018e08b1d466e8787fcaad8da9e8c777a01816a2868eba0cd8d8ef757352
  55. File name NewIssues.cmd [ASCII text]
  56. File size
  57.  
  58. SHA-256 9953dc1dfb656c66ec4ca87d371a72a3d413a96610025d59ae3729e5cd232da5
  59. File name NewInvoice.patch [ Win32 DLL ] - obfuscated
  60. File size 733.00 KB (750592 bytes)
  61.  
  62. SHA-256 dc9ad9461c6f6b59555da3f88fa6a63a2e6a6cbfaf8b28336c7c3a411d7102ae
  63. File name NewInvoice.patch [ Win32 DLL ] - deobfuscated
  64. File size 4.00 KB (4096 bytes)
  65.  
  66.  
  67. # # # # # # # #
  68. activity
  69. # # # # # # # #
  70.  
  71. PL_SCR email_attach
  72.  
  73.  
  74. C2 94.105.123.53:443
  75.  
  76. other (extracted by Hatching Triage)
  77.  
  78. version: 404.46
  79. botnet: azd
  80. campaign: 1670585059
  81.  
  82. 173.239.94.212:443
  83. 91.169.12.198:32100
  84. 74.66.134.24:443
  85. 66.191.69.18:995
  86. 182.75.189.42:995
  87. 78.69.251.252:2222
  88. 98.145.23.67:443
  89. 103.71.21.107:443
  90. 197.94.219.133:443
  91. 91.68.227.219:443
  92. 12.172.173.82:993
  93. 86.176.83.127:2222
  94. 64.121.161.102:443
  95. 41.98.21.114:443
  96. 92.154.17.149:2222
  97. 151.65.67.211:443
  98. 89.129.109.27:2222
  99. 76.11.14.249:443
  100. 69.119.123.159:2222
  101. 70.66.199.12:443
  102. 12.172.173.82:990
  103. 183.82.100.110:2222
  104. 83.114.60.6:2222
  105. 92.189.214.236:2222
  106. 70.115.104.126:995
  107. 190.18.236.175:443
  108. 121.122.99.223:995
  109. 72.53.103.56:443
  110. 91.165.188.74:50000
  111. 12.172.173.82:995
  112. 156.220.229.249:993
  113. 86.96.75.237:2222
  114. 85.152.152.46:443
  115. 181.118.183.44:443
  116. 76.80.180.154:995
  117. 81.248.77.37:2222
  118. 90.66.229.185:2222
  119. 86.130.9.250:2222
  120. 172.117.139.142:995
  121. 12.172.173.82:465
  122. 75.143.236.149:443
  123. 81.229.117.95:2222
  124. 81.111.108.123:443
  125. 50.68.204.71:995
  126. 124.122.55.68:443
  127. 139.5.239.14:443
  128. 37.56.111.49:995
  129. 46.10.198.106:443
  130. 85.61.165.153:2222
  131. 90.104.22.28:2222
  132. 88.126.94.4:50000
  133. 90.89.95.158:2222
  134. 83.213.201.104:993
  135. 73.223.248.31:443
  136. 47.41.154.250:443
  137. 2.99.47.198:2222
  138. 190.199.169.127:993
  139. 83.92.85.93:443
  140. 184.68.116.146:2222
  141. 73.161.176.218:443
  142. 150.107.231.59:2222
  143. 98.178.242.28:443
  144. 213.67.255.57:2222
  145. 174.104.184.149:443
  146. 108.6.249.139:443
  147. 84.35.26.14:995
  148. 149.126.159.106:443
  149. 184.68.116.146:3389
  150. 37.14.229.220:2222
  151. 24.206.27.39:443
  152. 199.83.165.233:443
  153. 84.215.202.22:443
  154. 71.247.10.63:995
  155. 50.68.204.71:443
  156. 86.169.19.140:2222
  157. 76.20.42.45:443
  158. 70.55.120.16:2222
  159. 69.133.162.35:443
  160. 12.172.173.82:21
  161. 72.200.109.104:443
  162. 50.68.204.71:993
  163. 2.83.12.243:443
  164. 184.176.154.83:995
  165. 176.177.136.35:443
  166. 92.207.132.174:2222
  167. 174.77.209.5:443
  168. 142.161.27.232:2222
  169. 86.159.48.25:2222
  170. 100.6.8.7:443
  171. 184.153.132.82:443
  172. 27.109.19.90:2078
  173. 94.105.123.53:443
  174. 198.2.51.242:993
  175. 70.120.228.205:443
  176. 75.158.15.211:443
  177. 181.164.194.223:443
  178. 184.68.116.146:61202
  179. 184.68.116.146:2078
  180. 86.225.214.138:2222
  181. 78.213.14.206:443
  182. 176.142.207.63:443
  183. 73.36.196.11:443
  184. 197.26.142.159:443
  185. 176.151.15.101:443
  186. 87.65.160.87:995
  187. 92.24.200.226:995
  188. 87.221.197.110:2222
  189. 77.86.98.236:443
  190. 162.248.14.107:443
  191. 84.113.121.103:443
  192. 137.186.193.226:3389
  193. 92.8.190.211:2222
  194. 201.208.139.250:2222
  195. 12.172.173.82:22
  196. 75.98.154.19:443
  197. 24.142.218.202:443
  198. 70.77.116.233:443
  199. 24.228.132.224:2222
  200. 92.145.203.167:2222
  201.  
  202.  
  203.  
  204. netwrk
  205. --------------
  206. 94.105.123.53 443 TLSv1.2 Client Hello
  207. or (second run)
  208. 92.154.17.149 2222 TCP 49824 → 2222 [SYN] Seq=0 Win=65535 Len=0 MSS=1460 WS=256 SACK_PERM=1
  209.  
  210.  
  211. comp
  212. --------------
  213. wermgr.exe 3964 TCP 94.105.123.53 443 ESTABLISHED
  214. or (second run)
  215. wermgr.exe 4243 TCP 92.154.17.149 2222 ESTABLISHED
  216.  
  217.  
  218. proc
  219. --------------
  220. C:\Windows\System32\cmd.exe /c YouNewRules\NewIssues.cmd A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 0 1 2 3 4 5 6 7 8 9
  221. C:\Windows\system32\rundll32.exe /s newinvoice.patch,DrawThemeIcon
  222. C:\Windows\SysWOW64\rundll32.exe rundll32 /s newinvoice.patch,DrawThemeIcon
  223. C:\Windows\SysWOW64\wermgr.exe
  224. C:\Windows\SysWOW64\net.exe view
  225. C:\Windows\SysWOW64\cmd.exe /c set
  226. C:\Windows\SysWOW64\arp.exe -a
  227. C:\Windows\SysWOW64\ipconfig.exe /all
  228. C:\Windows\SysWOW64\nslookup.exe -querytype=ALL -timeout=12 _ldap._tcp.dc._msdcs.WORKGROUP
  229. C:\Windows\SysWOW64\net.exe share
  230. C:\Windows\SysWOW64\net1.exe share
  231. C:\Windows\SysWOW64\route.exe print
  232. C:\Windows\SysWOW64\netstat.exe -nao
  233. C:\Windows\SysWOW64\net.exe localgroup
  234. C:\Windows\SysWOW64\net1.exe localgroup
  235. C:\Windows\SysWOW64\whoami.exe /all
  236. C:\Windows\system32\msiexec.exe /V
  237.  
  238.  
  239. persist
  240. --------------
  241. n/a
  242.  
  243.  
  244. drop
  245. --------------
  246. n/a
  247.  
  248. # # # # # # # #
  249. VT & Intezer
  250. # # # # # # # #
  251. https://www.virustotal.com/gui/file/c2b17bc002f4db968e771b34a64e74c5cb04ace0e7b16d5cf18382b5e2ad45d4/details
  252. https://www.virustotal.com/gui/file/fda7ee3a400614bda8238a61d0f93c883329cf9b8912873b2c60d8f5c9deaea0/details
  253. https://www.virustotal.com/gui/file/bc080013aff169586dc5efb00ec3a7296791412c72ac3705bfd439da6d14f420/details
  254. https://www.virustotal.com/gui/file/b286440ca1c5d399582c6595d787045293f121152a02e62f4dcd5c2cbc8ed0ca/details
  255. https://www.virustotal.com/gui/file/ceb2378fc315e19c299ee8e33b23340b19273d7b31470fc1cd433fd0825fc0a2/details
  256. https://www.virustotal.com/gui/file/6295018e08b1d466e8787fcaad8da9e8c777a01816a2868eba0cd8d8ef757352/details
  257. https://www.virustotal.com/gui/file/9953dc1dfb656c66ec4ca87d371a72a3d413a96610025d59ae3729e5cd232da5/details
  258. https://analyze.intezer.com/analyses/be508a5c-6581-4ff6-8f2d-5e6e15db339e
  259. https://www.virustotal.com/gui/file/dc9ad9461c6f6b59555da3f88fa6a63a2e6a6cbfaf8b28336c7c3a411d7102ae/details
  260. https://analyze.intezer.com/analyses/e624e456-0bbc-44c6-87f5-fbbecf6fd567
  261.  
  262. VR
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement