{"id":103931,"date":"2021-09-02T10:00:32","date_gmt":"2021-09-02T10:00:32","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/securelist\/?p=103931"},"modified":"2024-02-19T07:56:12","modified_gmt":"2024-02-19T07:56:12","slug":"qakbot-technical-analysis","status":"publish","type":"post","link":"https:\/\/securelist.com\/qakbot-technical-analysis\/103931\/","title":{"rendered":"QakBot technical analysis"},"content":{"rendered":"<h2 id=\"main-description\">Main description<\/h2>\n<p>QakBot, also known as QBot, QuackBot and Pinkslipbot, is a banking Trojan that has existed for over a decade. It was found in the wild in 2007 and since then it has been continually maintained and developed.<\/p>\n<p>In recent years, QakBot has become one of the leading banking Trojans around the globe. Its main purpose is to steal banking credentials (e.g., logins, passwords, etc.), though it has also acquired functionality allowing it to spy on financial operations, spread itself, and install ransomware in order to maximize revenue from compromised organizations.<\/p>\n<p>To this day, QakBot continues to grow in terms of functionality, with even more capabilities and new techniques such as logging keystrokes, a backdoor functionality, and techniques to evade detection. It&#8217;s worth mentioning that the latter includes virtual environment detection, regular self-updates and cryptor\/packer changes. In addition, QakBot tries to protect itself from being analyzed and debugged by experts and automated tools.<\/p>\n<p>Another interesting piece of functionality is the ability to steal emails. These are later used by the attackers to send targeted emails to the victims, with the obtained information being used to lure victims into opening those emails.<\/p>\n<h2 id=\"qakbot-infection-chain\">QakBot infection chain<\/h2>\n<p>QakBot is known to infect its victims mainly via spam campaigns. In some cases, the emails were delivered with Microsoft Office documents (Word, Excel) or password-protected archives with the documents attached. The documents contained macros and victims were prompted to open the attachments with claims that they contained important information (e.g., an invoice). In some cases, the emails contained links to web pages distributing malicious documents.<\/p>\n<p>However, there is another infection vector that involves a malicious QakBot payload being transferred to the victim&#8217;s machine via other malware on the compromised machine.<\/p>\n<p>The initial infection vectors may vary depending on what the threat actors believe has the best chance of success for the targeted organization(s). It&#8217;s known that various threat actors perform reconnaissance (<a href=\"https:\/\/encyclopedia.kaspersky.com\/glossary\/osint\/?utm_source=securelist&amp;utm_medium=blog&amp;utm_campaign=termin-explanation\" target=\"_blank\" rel=\"noopener\">OSINT<\/a>) of target organizations beforehand to decide which infection vector is most suitable.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01145837\/Qakbot_technical_analysis_01.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-103964\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01145837\/Qakbot_technical_analysis_01-1024x350.png\" alt=\"QakBot infection chain\" width=\"1024\" height=\"350\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01145837\/Qakbot_technical_analysis_01-1024x350.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01145837\/Qakbot_technical_analysis_01-300x103.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01145837\/Qakbot_technical_analysis_01-768x263.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01145837\/Qakbot_technical_analysis_01-512x175.png 512w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01145837\/Qakbot_technical_analysis_01-370x126.png 370w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01145837\/Qakbot_technical_analysis_01-819x280.png 819w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01145837\/Qakbot_technical_analysis_01-800x273.png 800w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01145837\/Qakbot_technical_analysis_01.png 1489w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong><em>QakBot infection chain<\/em><\/strong><\/p>\n<p>The infection chain of recent QakBot releases (2020-2021 variants) is as follows:<\/p>\n<ul>\n<li>The user receives a phishing email with a ZIP attachment containing an Office document with embedded macros, the document itself or a link to download malicious document.<\/li>\n<li>The user opens the malicious attachment\/link and is tricked into clicking &#8220;Enable content&#8221;.<\/li>\n<li>A malicious macro is executed. Some variants perform a &#8216;GET&#8217; request to a URL requesting a &#8216;PNG&#8217; However, the file is in fact a binary.<\/li>\n<li>The loaded payload (stager) includes another binary containing encrypted resource modules. One of the encrypted resources has the DLL binary (loader) which is decrypted later during runtime.<\/li>\n<li>The &#8216;Stager&#8217; loads the &#8216;Loader&#8217; into the memory, which decrypts and runs the payload during runtime. The configuration settings are retrieved from another resource.<\/li>\n<li>The payload communicates with the C2 server.<\/li>\n<li>Additional threats such as ProLock ransomware can now be pushed to the infected machine.<\/li>\n<\/ul>\n<h2 id=\"typical-qakbot-functions\">Typical QakBot functions<\/h2>\n<p>Typical QakBot malicious activity observed in the wild includes:<\/p>\n<ul>\n<li>Collecting information about the compromised host;<\/li>\n<li>Creating scheduled tasks (privilege escalation and persistency);<\/li>\n<li>Credentials harvesting:\n<ul>\n<li>Credential dumping (Mimikatz, exe access)<a href=\"#footnote-1\">*<\/a>;<\/li>\n<li>Password stealing (from browser data and cookies);<\/li>\n<li>Targeting web banking links (web injects)<a href=\"#footnote-1\">*<\/a>.<\/li>\n<\/ul>\n<\/li>\n<li>Password brute forcing;<\/li>\n<li>Registry manipulation (persistence);<\/li>\n<li>Creating a copy of itself;<\/li>\n<li>Process injection to conceal the malicious process.<\/li>\n<\/ul>\n<h2 id=\"communication-with-c2\">Communication with C2<\/h2>\n<p>The QakBot malware contains a list of 150 IP addresses hardcoded into the loader binary resource. Most of these addresses belong to other infected systems that are used as a proxy to forward traffic to other proxies or the real \u04212.<\/p>\n<p>Communication with the \u04212 is a HTTPS POST request with Base64-encoded data. The data is encrypted with the RC4 algorithm. The static string &#8220;jHxastDcds)oMc=jvh7wdUhxcsdt2&#8221; and a random 16-byte sequence are used for encryption. The data itself is in JSON format.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01145926\/Qakbot_technical_analysis_02.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-103965\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01145926\/Qakbot_technical_analysis_02.png\" alt=\"Original message in JSON format\" width=\"514\" height=\"92\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01145926\/Qakbot_technical_analysis_02.png 514w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01145926\/Qakbot_technical_analysis_02-300x54.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01145926\/Qakbot_technical_analysis_02-370x66.png 370w\" sizes=\"auto, (max-width: 514px) 100vw, 514px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong><em>Original message in JSON format<\/em><\/strong><\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151603\/Qakbot_technical_analysis_03.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-103966\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151603\/Qakbot_technical_analysis_03.png\" alt=\"HTTPS POST request with encrypted JSON\" width=\"865\" height=\"245\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151603\/Qakbot_technical_analysis_03.png 865w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151603\/Qakbot_technical_analysis_03-300x85.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151603\/Qakbot_technical_analysis_03-768x218.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151603\/Qakbot_technical_analysis_03-618x175.png 618w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151603\/Qakbot_technical_analysis_03-370x105.png 370w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151603\/Qakbot_technical_analysis_03-800x227.png 800w\" sizes=\"auto, (max-width: 865px) 100vw, 865px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong><em>HTTPS POST request with encrypted JSON<\/em><\/strong><\/p>\n<p>Usually, after infection the bot sends a &#8216;PING&#8217; message, &#8216;SYSTEM INFO&#8217; message and &#8216;ASK for COMMAND&#8217; message, and the C2 replies with &#8216;ACK&#8217; and &#8216;COMMAND&#8217; messages. If additional modules were pushed by the C2, the bot sends a &#8216;STOLEN INFO&#8217; message containing data stolen by the modules.<\/p>\n<ul>\n<li><strong>&#8216;PING&#8217; message<\/strong> \u2013 bot request message to C2 with &#8216;BOT ID&#8217; in order to check if \u04212 is active:<\/li>\n<\/ul>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151656\/Qakbot_technical_analysis_04.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-103967\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151656\/Qakbot_technical_analysis_04.png\" alt=\"'PING' message\" width=\"514\" height=\"92\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151656\/Qakbot_technical_analysis_04.png 514w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151656\/Qakbot_technical_analysis_04-300x54.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151656\/Qakbot_technical_analysis_04-370x66.png 370w\" sizes=\"auto, (max-width: 514px) 100vw, 514px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong><em>&#8216;PING&#8217; message<\/em><\/strong><\/p>\n<ul>\n<li><strong>&#8216;ACK&#8217; message<\/strong> \u2013 C2 response message with field &#8220;16&#8221; containing the external IP address of the infected system, the only valuable information:<\/li>\n<\/ul>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151717\/Qakbot_technical_analysis_05.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-103968\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151717\/Qakbot_technical_analysis_05.png\" alt=\"'ACK' message\" width=\"717\" height=\"111\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151717\/Qakbot_technical_analysis_05.png 717w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151717\/Qakbot_technical_analysis_05-300x46.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151717\/Qakbot_technical_analysis_05-370x57.png 370w\" sizes=\"auto, (max-width: 717px) 100vw, 717px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong><em>&#8216;ACK&#8217; message<\/em><\/strong><\/p>\n<ul>\n<li><strong>&#8216;SYSTEM INFO&#8217; message<\/strong> \u2013 bot request message to C2 with information collected about the infected system. In addition to general system information such as OS version and bitness, user name, computer name, domain, screen resolution, system time, system uptime and bot uptime, it also contains the results of the following utilities and WMI queries:\n<ul>\n<li>whoami \/all<\/li>\n<li>arp -a<\/li>\n<li>ipconfig \/all<\/li>\n<li>net view \/all<\/li>\n<li>cmd \/c set<\/li>\n<li>nslookup -querytype=ALL -timeout=10 _ldap._tcp.dc._msdcs.{DOMAIN}<\/li>\n<li>nltest \/domain_trusts \/all_trusts<\/li>\n<li>net share<\/li>\n<li>route print<\/li>\n<li>netstat -nao<\/li>\n<li>net localgroup<\/li>\n<li>qwinsta<\/li>\n<li>WMI Query ROOTCIMV2:Win32_BIOS<\/li>\n<li>WMI Query ROOTCIMV2:Win32_DiskDrive<\/li>\n<li>WMI Query ROOTCIMV2:Win32_PhysicalMemory<\/li>\n<li>WMI Query ROOTCIMV2:Win32_Product<\/li>\n<li>WMI Query ROOTCIMV2:Win32_PnPEntity<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151750\/Qakbot_technical_analysis_06.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-103969\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151750\/Qakbot_technical_analysis_06.png\" alt=\"'SYSTEM INFO' message\" width=\"865\" height=\"952\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151750\/Qakbot_technical_analysis_06.png 865w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151750\/Qakbot_technical_analysis_06-273x300.png 273w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151750\/Qakbot_technical_analysis_06-768x845.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151750\/Qakbot_technical_analysis_06-159x175.png 159w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151750\/Qakbot_technical_analysis_06-370x407.png 370w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151750\/Qakbot_technical_analysis_06-254x280.png 254w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151750\/Qakbot_technical_analysis_06-800x880.png 800w\" sizes=\"auto, (max-width: 865px) 100vw, 865px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong><em>&#8216;SYSTEM INFO&#8217; message<\/em><\/strong><\/p>\n<ul>\n<li><strong>&#8216;ASK for COMMAND&#8217; message<\/strong> \u2013 bot command request message to C2. After the &#8216;SYSTEM INFO&#8217; message is sent, the bot starts asking the C2 for a command to execute. One of the main fields is &#8220;14&#8221; \u2013 the SALT. This field is unique and changes in every request. It is used to protect against hijacking or takeover of a bot. After receiving this request, the \u04212 uses the SALT in the signing procedure and places the signature in the response, so the bot can check the signed data. Only a valid and signed command will be executed.<\/li>\n<\/ul>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151810\/Qakbot_technical_analysis_07.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-103970\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151810\/Qakbot_technical_analysis_07.png\" alt=\"'ASK for COMMAND' message\" width=\"494\" height=\"283\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151810\/Qakbot_technical_analysis_07.png 494w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151810\/Qakbot_technical_analysis_07-300x172.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151810\/Qakbot_technical_analysis_07-305x175.png 305w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151810\/Qakbot_technical_analysis_07-370x212.png 370w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151810\/Qakbot_technical_analysis_07-489x280.png 489w\" sizes=\"auto, (max-width: 494px) 100vw, 494px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong><em>&#8216;ASK for COMMAND&#8217; message<\/em><\/strong><\/p>\n<ul>\n<li><strong>&#8216;COMMAND&#8217; message<\/strong> \u2013 C2 response message with command to execute. The current version of the bot supports 24 commands, most of them related to download, execution, drop of additional modules and module configuration files with different options, or setup\/update configuration values.<br \/>\nThis type of message contains the signed value of the SALT (obtained from the bot&#8217;s request field &#8220;14&#8221;), COMMAND ID and MODULE ID. The other values of the message are not signed.In previous versions, the bot received modules and commands immediately after infection and sending a &#8216;SYSTEM INFO&#8217; message. Now, the C2 responds with an empty command for about an hour. Only after that will the C2 send commands and modules in the response. We believe that this time delay is used to make it difficult to receive and analyze new commands and modules in an isolated controlled environment.<\/li>\n<\/ul>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151829\/Qakbot_technical_analysis_08.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-103971\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151829\/Qakbot_technical_analysis_08.png\" alt=\"'COMMAND' C2 response with empty command\" width=\"826\" height=\"161\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151829\/Qakbot_technical_analysis_08.png 826w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151829\/Qakbot_technical_analysis_08-300x58.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151829\/Qakbot_technical_analysis_08-768x150.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151829\/Qakbot_technical_analysis_08-370x72.png 370w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151829\/Qakbot_technical_analysis_08-800x156.png 800w\" sizes=\"auto, (max-width: 826px) 100vw, 826px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong><em>&#8216;COMMAND&#8217; C2 response with empty command<\/em><\/strong><\/p>\n<p>If the C2 pushes some modules, the Base64-encoded binary is placed into field &#8220;20&#8221; of the message.<\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151901\/Qakbot_technical_analysis_09.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-103972\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151901\/Qakbot_technical_analysis_09.png\" alt=\"'COMMAND' C2 response with additional module to load\" width=\"706\" height=\"160\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151901\/Qakbot_technical_analysis_09.png 706w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151901\/Qakbot_technical_analysis_09-300x68.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151901\/Qakbot_technical_analysis_09-370x84.png 370w\" sizes=\"auto, (max-width: 706px) 100vw, 706px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong><em>&#8216;COMMAND&#8217; C2 response with additional module to load<\/em><\/strong><\/p>\n<ul>\n<li><strong>&#8216;STOLEN INFO&#8217; message<\/strong> \u2013 bot message to C2 with stolen information like passwords, accounts, emails, etc. Stolen information is RC4 encrypted and Base64 encoded. The key for the RC4 encryption is generated in a different way and based on the infected system ID (aka Bot ID) values, and not based on a static string as in the case of traffic encryption.<\/li>\n<\/ul>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151922\/Qakbot_technical_analysis_10.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-103973\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151922\/Qakbot_technical_analysis_10.png\" alt=\"'STOLEN INFO' message\" width=\"659\" height=\"162\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151922\/Qakbot_technical_analysis_10.png 659w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151922\/Qakbot_technical_analysis_10-300x74.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151922\/Qakbot_technical_analysis_10-370x91.png 370w\" sizes=\"auto, (max-width: 659px) 100vw, 659px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong><em>&#8216;STOLEN INFO&#8217; message<\/em><\/strong><\/p>\n<p>Once communication with the C2 server has been established, QakBot is known to download and use additional modules in order to perform its malicious operations.<\/p>\n<p>The additional modules differ from sample to sample and may include: &#8216;Cookie grabber&#8217;, &#8216;Email Collector&#8217;, &#8216;Credentials grabber&#8217;, and &#8216;Proxy module&#8217; among others.<\/p>\n<p>These modules may be written by the threat actors themselves or may be borrowed from third-party repositories and adapted. It can vary from sample to sample. For example, there are older samples that may use Mimikatz for credentials dumping.<\/p>\n<p>Below are some of the modules that we found during our research.<\/p>\n<h2 id=\"additional-modules\">Additional modules<\/h2>\n<ul>\n<li><strong>Cookie Grabber<\/strong> \u2013 collects cookies from popular browsers (Edge, Firefox, Chrome, Internet Explorer).<\/li>\n<\/ul>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151946\/Qakbot_technical_analysis_11.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-103974\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151946\/Qakbot_technical_analysis_11.png\" alt=\"\" width=\"602\" height=\"126\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151946\/Qakbot_technical_analysis_11.png 602w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151946\/Qakbot_technical_analysis_11-300x63.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01151946\/Qakbot_technical_analysis_11-370x77.png 370w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/a><\/p>\n<ul>\n<li><strong>Hidden VNC<\/strong> \u2013 allows threat actors to connect to the infected machine and interact with it without the real user knowing.<\/li>\n<\/ul>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152006\/Qakbot_technical_analysis_12.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-103975\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152006\/Qakbot_technical_analysis_12.png\" alt=\"\" width=\"801\" height=\"324\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152006\/Qakbot_technical_analysis_12.png 801w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152006\/Qakbot_technical_analysis_12-300x121.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152006\/Qakbot_technical_analysis_12-768x311.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152006\/Qakbot_technical_analysis_12-433x175.png 433w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152006\/Qakbot_technical_analysis_12-370x150.png 370w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152006\/Qakbot_technical_analysis_12-692x280.png 692w\" sizes=\"auto, (max-width: 801px) 100vw, 801px\" \/><\/a><\/p>\n<ul>\n<li><strong>Email Collector<\/strong> \u2013 tries to find Microsoft Outlook on the infected machine, then iterates over the software folders and recursively collects emails. Finally, the module exfiltrates the collected emails to the remote server.<\/li>\n<\/ul>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152027\/Qakbot_technical_analysis_13.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-103976\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152027\/Qakbot_technical_analysis_13.png\" alt=\"The threat actors distributed a debug version of the email collector module at some point\" width=\"653\" height=\"338\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152027\/Qakbot_technical_analysis_13.png 653w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152027\/Qakbot_technical_analysis_13-300x155.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152027\/Qakbot_technical_analysis_13-338x175.png 338w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152027\/Qakbot_technical_analysis_13-370x192.png 370w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152027\/Qakbot_technical_analysis_13-541x280.png 541w\" sizes=\"auto, (max-width: 653px) 100vw, 653px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong><em>The threat actors distributed a debug version of the email collector module at some point<\/em><\/strong><\/p>\n<ul>\n<li><strong>Hooking module<\/strong> \u2013 hooks a hardcoded set of WinAPI and (if they exist) Mozilla DLL Hooking is used to perform web injects, sniff traffic and keyboard data and even prevent DNS resolution of certain domains. Hooking works in the following way: QakBot injects a hooking module into the appropriate process, the module finds functions from the hardcoded set and modifies the functions so they jump to custom code.<\/li>\n<\/ul>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152050\/Qakbot_technical_analysis_14-1.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-103977\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152050\/Qakbot_technical_analysis_14-1.png\" alt=\"The module contains a ciphered list of DLLs and functions that the bot will hook\" width=\"772\" height=\"424\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152050\/Qakbot_technical_analysis_14-1.png 772w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152050\/Qakbot_technical_analysis_14-1-300x165.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152050\/Qakbot_technical_analysis_14-1-768x422.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152050\/Qakbot_technical_analysis_14-1-319x175.png 319w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152050\/Qakbot_technical_analysis_14-1-370x203.png 370w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152050\/Qakbot_technical_analysis_14-1-510x280.png 510w\" sizes=\"auto, (max-width: 772px) 100vw, 772px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong><em>The module contains a ciphered list of DLLs and functions that the bot will hook<\/em><\/strong><\/p>\n<ul>\n<li><strong>Passgrabber module<\/strong> \u2013 collects logins and passwords from various sources: Firefox and Chrome files, Microsoft Vault storage, etc. Instead of using Mimikatz as in previous versions, the module collects passwords using its own algorithms.<\/li>\n<\/ul>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152123\/Qakbot_technical_analysis_15.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-103978\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152123\/Qakbot_technical_analysis_15.png\" alt=\"Procedure that collects passwords from different sources\" width=\"431\" height=\"320\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152123\/Qakbot_technical_analysis_15.png 431w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152123\/Qakbot_technical_analysis_15-300x223.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152123\/Qakbot_technical_analysis_15-236x175.png 236w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152123\/Qakbot_technical_analysis_15-370x275.png 370w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152123\/Qakbot_technical_analysis_15-377x280.png 377w\" sizes=\"auto, (max-width: 431px) 100vw, 431px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong><em>Procedure that collects passwords from different sources<\/em><\/strong><\/p>\n<ul>\n<li><strong>Proxy module<\/strong> \u2013 tries to determine which ports are available to listen to using the UPnP port forwarding and tier 2 \u04212 query. Comparing current and old proxy loader versions revealed some interesting things: the threat actors decided to remove the cURL dependency from the binary and perform all HTTP communications using their own code. Besides removing cURL, they also removed OpenSSL dependencies and embedded all functions into a single executable \u2013 there are no more proxy loaders or proxy modules, it&#8217;s a single file now.<\/li>\n<\/ul>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152147\/Qakbot_technical_analysis_16.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-103979\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152147\/Qakbot_technical_analysis_16.png\" alt=\"UPnP port forwarding query construction\" width=\"537\" height=\"369\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152147\/Qakbot_technical_analysis_16.png 537w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152147\/Qakbot_technical_analysis_16-300x206.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152147\/Qakbot_technical_analysis_16-255x175.png 255w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152147\/Qakbot_technical_analysis_16-370x254.png 370w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152147\/Qakbot_technical_analysis_16-407x280.png 407w\" sizes=\"auto, (max-width: 537px) 100vw, 537px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong><em>UPnP port forwarding query construction<\/em><\/strong><\/p>\n<p>After trying to determine whether ports are open and the machine could act as a C2 tier 2 proxy, the proxy module also starts a multithreaded SOCKS5 proxy server. The SOCKS5 protocol is encapsulated into the QakBot proxy protocol composed of: QakBot proxy command (1 byte), version (1 byte), session id (4 bytes), total packet length (dword), data (total packet length-10). Incoming and outgoing packets are stored in the buffers and may be received\/transmitted one by one or in multiple packets in a single TCP data segment (streamed).<\/p>\n<p>The usual proxy module execution flow is as follows:<\/p>\n<ol>\n<li>Communicate with the C2, try to forward ports with UPnP and determine available ports and report them to the C2. The usual C2 communication protocol used here is HTTP POST RC4-ciphered JSON data.<\/li>\n<li>Download the OpenSSL library. Instead of saving the downloaded file, QakBot measures the download speed and deletes the received file.<\/li>\n<li>Set up external PROXY-C2 connection that was received with command 37 (update config)\/module 274 (proxy) by the stager.<\/li>\n<\/ol>\n<p>Communicating with the external PROXY-C2:<\/p>\n<ol>\n<li>Send initial proxy module request. The initial request contains the bot ID, external IP address of the infected machine, reverse DNS lookup of the external IP address, internet speed (measured earlier) and seconds since the proxy module started.<\/li>\n<li>Establish a connection (proxy commands sequence 1-&gt;10-&gt;11) with the PROXY-C2.<\/li>\n<li>Initialize sessions, perform socks5 authorization with login\/password (received from PROXY-C2 with command 10).<\/li>\n<li>Begin SOCKS5-like communication wrapped into the QakBot proxy module protocol.<\/li>\n<\/ol>\n<p>QakBot proxy commands are as follows:<\/p>\n<table>\n<tbody>\n<tr>\n<td><strong>Command<\/strong><\/td>\n<td><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>Hello (bot-&gt;C2)<\/td>\n<\/tr>\n<tr>\n<td>10<\/td>\n<td>Set up auth credentials (C2-&gt;bot)<\/td>\n<\/tr>\n<tr>\n<td>11<\/td>\n<td>Confirm credentials setup (bot-&gt;C2)<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>Create new proxy session (C2-&gt;bot)<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>SOCKS5 AUTH (bot-&gt;C2)<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>SOCKS5 requests processing (works for both sides)<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td>Close session (works for both sides)<\/td>\n<\/tr>\n<tr>\n<td>6<\/td>\n<td>Update session state\/session state updated notification (works for both sides)<\/td>\n<\/tr>\n<tr>\n<td>7<\/td>\n<td>Update session state\/session state updated notification (works for both sides)<\/td>\n<\/tr>\n<tr>\n<td>8<\/td>\n<td>PING (C2-&gt;bot)<\/td>\n<\/tr>\n<tr>\n<td>9<\/td>\n<td>PONG (bot-&gt;C2)<\/td>\n<\/tr>\n<tr>\n<td>19<\/td>\n<td>Save current time in registry (C2-&gt;bot)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152222\/Qakbot_technical_analysis_17.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-103980\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152222\/Qakbot_technical_analysis_17-1024x370.png\" alt=\"Parsed packets from C2\" width=\"1024\" height=\"370\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152222\/Qakbot_technical_analysis_17-1024x370.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152222\/Qakbot_technical_analysis_17-300x108.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152222\/Qakbot_technical_analysis_17-768x277.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152222\/Qakbot_technical_analysis_17-485x175.png 485w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152222\/Qakbot_technical_analysis_17-370x134.png 370w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152222\/Qakbot_technical_analysis_17-776x280.png 776w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152222\/Qakbot_technical_analysis_17-800x289.png 800w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152222\/Qakbot_technical_analysis_17.png 1100w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong><em>Parsed packets from C2<\/em><\/strong><\/p>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152242\/Qakbot_technical_analysis_18.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-103981\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152242\/Qakbot_technical_analysis_18.png\" alt=\"Tracking single proxy\" width=\"867\" height=\"800\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152242\/Qakbot_technical_analysis_18.png 867w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152242\/Qakbot_technical_analysis_18-300x277.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152242\/Qakbot_technical_analysis_18-768x709.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152242\/Qakbot_technical_analysis_18-190x175.png 190w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152242\/Qakbot_technical_analysis_18-370x341.png 370w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152242\/Qakbot_technical_analysis_18-303x280.png 303w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152242\/Qakbot_technical_analysis_18-800x738.png 800w\" sizes=\"auto, (max-width: 867px) 100vw, 867px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong><em>Tracking single proxy<\/em><\/strong><\/p>\n<ul>\n<li><strong>Web inject<\/strong> \u2013 the configuration file for the hooking module<br \/>\nOnce communication with the C2 is established, one of the additional modules that is downloaded is the web-inject module. It intercepts the victim&#8217;s traffic by injecting the module into the browser&#8217;s process and hooking the network API. The hooking module gets the execution flow from intercepted APIs, and as soon as the victim accesses certain web pages related to banking and finance, additional JavaScript is injected into the source page.<\/li>\n<\/ul>\n<p style=\"text-align: center\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152304\/Qakbot_technical_analysis_19.png\" class=\"magnificImage\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-103982\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152304\/Qakbot_technical_analysis_19-1024x515.png\" alt=\"Fragment of JavaScript injected into the source page of the Wells Fargo login page\" width=\"1024\" height=\"515\" srcset=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152304\/Qakbot_technical_analysis_19-1024x515.png 1024w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152304\/Qakbot_technical_analysis_19-300x151.png 300w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152304\/Qakbot_technical_analysis_19-768x386.png 768w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152304\/Qakbot_technical_analysis_19-1536x772.png 1536w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152304\/Qakbot_technical_analysis_19-348x175.png 348w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152304\/Qakbot_technical_analysis_19-370x186.png 370w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152304\/Qakbot_technical_analysis_19-557x280.png 557w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152304\/Qakbot_technical_analysis_19-800x402.png 800w, https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01152304\/Qakbot_technical_analysis_19.png 1828w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p style=\"text-align: center\"><strong><em>Fragment of JavaScript injected into the source page of the Wells Fargo login page<\/em><\/strong><\/p>\n<h2 id=\"qakbot-statistics\">QakBot statistics<\/h2>\n<p>We analyzed statistics on QakBot attacks collected from our Kaspersky Security Network (KSN), where anonymized data voluntarily provided by Kaspersky users is accumulated and processed. In the first seven months of 2021 our products detected 181,869 attempts to download or run QakBot. This number is lower than the detection number from January to July 2020, though the number of users affected grew by 65% compared to the previous year and reached 17,316.<\/p>\n<p><div style=\"width: 1010px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01155141\/01-en-qakbot.png\" target=\"_blank\" rel=\"noopener\" class=\"magnificImage\"><img decoding=\"async\" src=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01155141\/01-en-qakbot.png\" target=\"_blank\" rel=\"noopener\" alt=\"\" class=\"aligncenter size-full\"\/><\/a><p class=\"wp-caption-text\"><em>Number of users affected by QakBot attacks from January to July in 2020 and 2021  (<a href=\"https:\/\/media.kasperskycontenthub.com\/wp-content\/uploads\/sites\/43\/2021\/09\/01155141\/01-en-qakbot.png\" target=\"_blank\" rel=\"noopener\">download<\/a>)<\/em><\/p><\/div><br \/>\nWe observed the largest campaigns in Q1 2021 when 12,704 users encountered QakBot, with 8,068 Kaspersky users being targeted in January and 4,007 in February.<\/p>\n<h2 id=\"conclusions\">Conclusions<\/h2>\n<p>QakBot is a known Trojan-Banker whose techniques may vary from binary to binary (older and newer versions). It has been active for over a decade and doesn&#8217;t look like going away anytime soon. The malware is continuously receiving updates and the threat actors keep adding new capabilities and updating its modules in order to steal information and maximize revenue.<\/p>\n<p>We know that threat actors change how they perform their malicious activities based on security vendor activities, using sophisticated techniques to stay under the radar. Although QakBot uses different techniques to avoid detection, for example, process enumeration in order to find running anti-malware solutions, our products are able to detect the threat using behavior analysis. The verdicts usually assigned to this malware:<\/p>\n<p>Backdoor.Win32.QBot<br \/>\nBackdoor.Win64.QBot<br \/>\nTrojan.JS.QBot<br \/>\nTrojan.MSOffice.QBot<br \/>\nTrojan.MSOffice.QbotLoader<br \/>\nTrojan.Win32.QBot<br \/>\nTrojan-Banker.Win32.QBot<br \/>\nTrojan-Banker.Win32.QakBot<br \/>\nTrojan-Banker.Win64.QBot<br \/>\nTrojan-Downloader.JS.QBot<br \/>\nTrojan-PSW.Win32.QBot<br \/>\nTrojan-Proxy.Win32.QBot<\/p>\n<h2 id=\"indicators-of-compromise-c2-server-addresses\">Indicators of compromise (C2 server addresses)<\/h2>\n<table>\n<tbody>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/75.67.192.125%3A443\/\" target=\"_blank\" rel=\"noopener\">75.67.192[.]125:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/24.179.77.236%3A443\/\" target=\"_blank\" rel=\"noopener\">24.179.77[.]236:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/70.163.161.79%3A443\/\" target=\"_blank\" rel=\"noopener\">70.163.161[.]79:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/72.240.200.181%3A2222\/\" target=\"_blank\" rel=\"noopener\">72.240.200[.]181:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/184.185.103.157%3A443\/\" target=\"_blank\" rel=\"noopener\">184.185.103[.]157:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/78.63.226.32%3A443\/\" target=\"_blank\" rel=\"noopener\">78.63.226[.]32:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/83.196.56.65%3A2222\/\" target=\"_blank\" rel=\"noopener\">83.196.56[.]65:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/95.77.223.148%3A443\/\" target=\"_blank\" rel=\"noopener\">95.77.223[.]148:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/76.168.147.166%3A993\/\" target=\"_blank\" rel=\"noopener\">76.168.147[.]166:993<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/105.198.236.99%3A443\/\" target=\"_blank\" rel=\"noopener\">105.198.236[.]99:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/73.151.236.31%3A443\/\" target=\"_blank\" rel=\"noopener\">73.151.236[.]31:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/64.121.114.87%3A443\/\" target=\"_blank\" rel=\"noopener\">64.121.114[.]87:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/213.122.113.120%3A443\/\" target=\"_blank\" rel=\"noopener\">213.122.113[.]120:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/97.69.160.4%3A2222\/\" target=\"_blank\" rel=\"noopener\">97.69.160[.]4:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/77.27.207.217%3A995\/\" target=\"_blank\" rel=\"noopener\">77.27.207[.]217:995<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/105.198.236.101%3A443\/\" target=\"_blank\" rel=\"noopener\">105.198.236[.]101:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/75.188.35.168%3A443\/\" target=\"_blank\" rel=\"noopener\">75.188.35[.]168:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/31.4.242.233%3A995\/\" target=\"_blank\" rel=\"noopener\">31.4.242[.]233:995<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/144.139.47.206%3A443\/\" target=\"_blank\" rel=\"noopener\">144.139.47[.]206:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/173.21.10.71%3A2222\/\" target=\"_blank\" rel=\"noopener\">173.21.10[.]71:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/125.62.192.220%3A443\/\" target=\"_blank\" rel=\"noopener\">125.62.192[.]220:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/83.110.109.155%3A2222\/\" target=\"_blank\" rel=\"noopener\">83.110.109[.]155:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/76.25.142.196%3A443\/\" target=\"_blank\" rel=\"noopener\">76.25.142[.]196:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/195.12.154.8%3A443\/\" target=\"_blank\" rel=\"noopener\">195.12.154[.]8:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/186.144.33.73%3A443\/\" target=\"_blank\" rel=\"noopener\">186.144.33[.]73:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/67.165.206.193%3A993\/\" target=\"_blank\" rel=\"noopener\">67.165.206[.]193:993<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/96.21.251.127%3A2222\/\" target=\"_blank\" rel=\"noopener\">96.21.251[.]127:2222<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/149.28.98.196%3A2222\/\" target=\"_blank\" rel=\"noopener\">149.28.98[.]196:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/222.153.122.173%3A995\/\" target=\"_blank\" rel=\"noopener\">222.153.122[.]173:995<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/71.199.192.62%3A443\/\" target=\"_blank\" rel=\"noopener\">71.199.192[.]62:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/45.77.117.108%3A2222\/\" target=\"_blank\" rel=\"noopener\">45.77.117[.]108:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/45.46.53.140%3A2222\/\" target=\"_blank\" rel=\"noopener\">45.46.53[.]140:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/70.168.130.172%3A995\/\" target=\"_blank\" rel=\"noopener\">70.168.130[.]172:995<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/45.32.211.207%3A995\/\" target=\"_blank\" rel=\"noopener\">45.32.211[.]207:995<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/71.74.12.34%3A443\/\" target=\"_blank\" rel=\"noopener\">71.74.12[.]34:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/82.12.157.95%3A995\/\" target=\"_blank\" rel=\"noopener\">82.12.157[.]95:995<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/149.28.98.196%3A995\/\" target=\"_blank\" rel=\"noopener\">149.28.98[.]196:995<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/50.29.166.232%3A995\/\" target=\"_blank\" rel=\"noopener\">50.29.166[.]232:995<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/209.210.187.52%3A995\/\" target=\"_blank\" rel=\"noopener\">209.210.187[.]52:995<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/149.28.99.97%3A443\/\" target=\"_blank\" rel=\"noopener\">149.28.99[.]97:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/109.12.111.14%3A443\/\" target=\"_blank\" rel=\"noopener\">109.12.111[.]14:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/209.210.187.52%3A443\/\" target=\"_blank\" rel=\"noopener\">209.210.187[.]52:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/207.246.77.75%3A8443\/\" target=\"_blank\" rel=\"noopener\">207.246.77[.]75:8443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/68.186.192.69%3A443\/\" target=\"_blank\" rel=\"noopener\">68.186.192[.]69:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/67.6.12.4%3A443\/\" target=\"_blank\" rel=\"noopener\">67.6.12[.]4:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/149.28.99.97%3A2222\/\" target=\"_blank\" rel=\"noopener\">149.28.99[.]97:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/188.27.179.172%3A443\/\" target=\"_blank\" rel=\"noopener\">188.27.179[.]172:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/189.222.59.177%3A443\/\" target=\"_blank\" rel=\"noopener\">189.222.59[.]177:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/149.28.101.90%3A443\/\" target=\"_blank\" rel=\"noopener\">149.28.101[.]90:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/98.192.185.86%3A443\/\" target=\"_blank\" rel=\"noopener\">98.192.185[.]86:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/174.104.22.30%3A443\/\" target=\"_blank\" rel=\"noopener\">174.104.22[.]30:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/149.28.99.97%3A995\/\" target=\"_blank\" rel=\"noopener\">149.28.99[.]97:995<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/189.210.115.207%3A443\/\" target=\"_blank\" rel=\"noopener\">189.210.115[.]207:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/142.117.191.18%3A2222\/\" target=\"_blank\" rel=\"noopener\">142.117.191[.]18:2222<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/149.28.101.90%3A8443\/\" target=\"_blank\" rel=\"noopener\">149.28.101[.]90:8443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/68.204.7.158%3A443\/\" target=\"_blank\" rel=\"noopener\">68.204.7[.]158:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/189.146.183.105%3A443\/\" target=\"_blank\" rel=\"noopener\">189.146.183[.]105:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/92.59.35.196%3A2222\/\" target=\"_blank\" rel=\"noopener\">92.59.35[.]196:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/75.137.47.174%3A443\/\" target=\"_blank\" rel=\"noopener\">75.137.47[.]174:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/213.60.147.140%3A443\/\" target=\"_blank\" rel=\"noopener\">213.60.147[.]140:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/45.63.107.192%3A995\/\" target=\"_blank\" rel=\"noopener\">45.63.107[.]192:995<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/24.229.150.54%3A995\/\" target=\"_blank\" rel=\"noopener\">24.229.150[.]54:995<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/196.221.207.137%3A995\/\" target=\"_blank\" rel=\"noopener\">196.221.207[.]137:995<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/45.63.107.192%3A443\/\" target=\"_blank\" rel=\"noopener\">45.63.107[.]192:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/86.220.60.247%3A2222\/\" target=\"_blank\" rel=\"noopener\">86.220.60[.]247:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/108.46.145.30%3A443\/\" target=\"_blank\" rel=\"noopener\">108.46.145[.]30:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/45.32.211.207%3A8443\/\" target=\"_blank\" rel=\"noopener\">45.32.211[.]207:8443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/193.248.221.184%3A2222\/\" target=\"_blank\" rel=\"noopener\">193.248.221[.]184:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/187.250.238.164%3A995\/\" target=\"_blank\" rel=\"noopener\">187.250.238[.]164:995<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/197.45.110.165%3A995\/\" target=\"_blank\" rel=\"noopener\">197.45.110[.]165:995<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/151.205.102.42%3A443\/\" target=\"_blank\" rel=\"noopener\">151.205.102[.]42:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/2.7.116.188%3A2222\/\" target=\"_blank\" rel=\"noopener\">2.7.116[.]188:2222<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/45.32.211.207%3A2222\/\" target=\"_blank\" rel=\"noopener\">45.32.211[.]207:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/71.41.184.10%3A3389\/\" target=\"_blank\" rel=\"noopener\">71.41.184[.]10:3389<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/195.43.173.70%3A443\/\" target=\"_blank\" rel=\"noopener\">195.43.173[.]70:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/96.253.46.210%3A443\/\" target=\"_blank\" rel=\"noopener\">96.253.46[.]210:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/24.55.112.61%3A443\/\" target=\"_blank\" rel=\"noopener\">24.55.112[.]61:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/106.250.150.98%3A443\/\" target=\"_blank\" rel=\"noopener\">106.250.150[.]98:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/172.78.59.180%3A443\/\" target=\"_blank\" rel=\"noopener\">172.78.59[.]180:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/24.139.72.117%3A443\/\" target=\"_blank\" rel=\"noopener\">24.139.72[.]117:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/45.67.231.247%3A443\/\" target=\"_blank\" rel=\"noopener\">45.67.231[.]247:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/90.65.234.26%3A2222\/\" target=\"_blank\" rel=\"noopener\">90.65.234[.]26:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/72.252.201.69%3A443\/\" target=\"_blank\" rel=\"noopener\">72.252.201[.]69:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/83.110.103.152%3A443\/\" target=\"_blank\" rel=\"noopener\">83.110.103[.]152:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/47.22.148.6%3A443\/\" target=\"_blank\" rel=\"noopener\">47.22.148[.]6:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/175.143.92.16%3A443\/\" target=\"_blank\" rel=\"noopener\">175.143.92[.]16:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/83.110.9.71%3A2222\/\" target=\"_blank\" rel=\"noopener\">83.110.9[.]71:2222<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/149.28.101.90%3A995\/\" target=\"_blank\" rel=\"noopener\">149.28.101[.]90:995<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/100.2.20.137%3A443\/\" target=\"_blank\" rel=\"noopener\">100.2.20[.]137:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/78.97.207.104%3A443\/\" target=\"_blank\" rel=\"noopener\">78.97.207[.]104:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/207.246.77.75%3A2222\/\" target=\"_blank\" rel=\"noopener\">207.246.77[.]75:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/46.149.81.250%3A443\/\" target=\"_blank\" rel=\"noopener\">46.149.81[.]250:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/59.90.246.200%3A443\/\" target=\"_blank\" rel=\"noopener\">59.90.246[.]200:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/144.202.38.185%3A995\/\" target=\"_blank\" rel=\"noopener\">144.202.38[.]185:995<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/207.246.116.237%3A8443\/\" target=\"_blank\" rel=\"noopener\">207.246.116[.]237:8443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/80.227.5.69%3A443\/\" target=\"_blank\" rel=\"noopener\">80.227.5[.]69:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/45.77.115.208%3A995\/\" target=\"_blank\" rel=\"noopener\">45.77.115[.]208:995<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/207.246.116.237%3A995\/\" target=\"_blank\" rel=\"noopener\">207.246.116[.]237:995<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/125.63.101.62%3A443\/\" target=\"_blank\" rel=\"noopener\">125.63.101[.]62:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/149.28.101.90%3A2222\/\" target=\"_blank\" rel=\"noopener\">149.28.101[.]90:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/207.246.116.237%3A443\/\" target=\"_blank\" rel=\"noopener\">207.246.116[.]237:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/86.236.77.68%3A2222\/\" target=\"_blank\" rel=\"noopener\">86.236.77[.]68:2222<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/45.32.211.207%3A443\/\" target=\"_blank\" rel=\"noopener\">45.32.211[.]207:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/207.246.116.237%3A2222\/\" target=\"_blank\" rel=\"noopener\">207.246.116[.]237:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/109.106.69.138%3A2222\/\" target=\"_blank\" rel=\"noopener\">109.106.69[.]138:2222<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/149.28.98.196%3A443\/\" target=\"_blank\" rel=\"noopener\">149.28.98[.]196:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/45.63.107.192%3A2222\/\" target=\"_blank\" rel=\"noopener\">45.63.107[.]192:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/84.72.35.226%3A443\/\" target=\"_blank\" rel=\"noopener\">84.72.35[.]226:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/45.77.117.108%3A443\/\" target=\"_blank\" rel=\"noopener\">45.77.117[.]108:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/71.163.222.223%3A443\/\" target=\"_blank\" rel=\"noopener\">71.163.222[.]223:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/217.133.54.140%3A32100\/\" target=\"_blank\" rel=\"noopener\">217.133.54[.]140:32100<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/144.202.38.185%3A2222\/\" target=\"_blank\" rel=\"noopener\">144.202.38[.]185:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/98.252.118.134%3A443\/\" target=\"_blank\" rel=\"noopener\">98.252.118[.]134:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/197.161.154.132%3A443\/\" target=\"_blank\" rel=\"noopener\">197.161.154[.]132:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/45.77.115.208%3A8443\/\" target=\"_blank\" rel=\"noopener\">45.77.115[.]208:8443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/96.37.113.36%3A993\/\" target=\"_blank\" rel=\"noopener\">96.37.113[.]36:993<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/89.137.211.239%3A995\/\" target=\"_blank\" rel=\"noopener\">89.137.211[.]239:995<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/45.77.115.208%3A443\/\" target=\"_blank\" rel=\"noopener\">45.77.115[.]208:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/27.223.92.142%3A995\/\" target=\"_blank\" rel=\"noopener\">27.223.92[.]142:995<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/74.222.204.82%3A995\/\" target=\"_blank\" rel=\"noopener\">74.222.204[.]82:995<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/207.246.77.75%3A995\/\" target=\"_blank\" rel=\"noopener\">207.246.77[.]75:995<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/24.152.219.253%3A995\/\" target=\"_blank\" rel=\"noopener\">24.152.219[.]253:995<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/122.148.156.131%3A995\/\" target=\"_blank\" rel=\"noopener\">122.148.156[.]131:995<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/45.77.117.108%3A8443\/\" target=\"_blank\" rel=\"noopener\">45.77.117[.]108:8443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/24.95.61.62%3A443\/\" target=\"_blank\" rel=\"noopener\">24.95.61[.]62:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/156.223.110.23%3A443\/\" target=\"_blank\" rel=\"noopener\">156.223.110[.]23:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/45.77.117.108%3A995\/\" target=\"_blank\" rel=\"noopener\">45.77.117[.]108:995<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/96.61.23.88%3A995\/\" target=\"_blank\" rel=\"noopener\">96.61.23[.]88:995<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/144.139.166.18%3A443\/\" target=\"_blank\" rel=\"noopener\">144.139.166[.]18:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/45.77.115.208%3A2222\/\" target=\"_blank\" rel=\"noopener\">45.77.115[.]208:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/92.96.3.180%3A2078\/\" target=\"_blank\" rel=\"noopener\">92.96.3[.]180:2078<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/202.185.166.181%3A443\/\" target=\"_blank\" rel=\"noopener\">202.185.166[.]181:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/144.202.38.185%3A443\/\" target=\"_blank\" rel=\"noopener\">144.202.38[.]185:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/71.187.170.235%3A443\/\" target=\"_blank\" rel=\"noopener\">71.187.170[.]235:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/76.94.200.148%3A995\/\" target=\"_blank\" rel=\"noopener\">76.94.200[.]148:995<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/207.246.77.75%3A443\/\" target=\"_blank\" rel=\"noopener\">207.246.77[.]75:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/50.244.112.106%3A443\/\" target=\"_blank\" rel=\"noopener\">50.244.112[.]106:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/71.63.120.101%3A443\/\" target=\"_blank\" rel=\"noopener\">71.63.120[.]101:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/140.82.49.12%3A443\/\" target=\"_blank\" rel=\"noopener\">140.82.49[.]12:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/24.122.166.173%3A443\/\" target=\"_blank\" rel=\"noopener\">24.122.166[.]173:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/196.151.252.84%3A443\/\" target=\"_blank\" rel=\"noopener\">196.151.252[.]84:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/81.214.126.173%3A2222\/\" target=\"_blank\" rel=\"noopener\">81.214.126[.]173:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/73.25.124.140%3A2222\/\" target=\"_blank\" rel=\"noopener\">73.25.124[.]140:2222<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/202.188.138.162%3A443\/\" target=\"_blank\" rel=\"noopener\">202.188.138[.]162:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/216.201.162.158%3A443\/\" target=\"_blank\" rel=\"noopener\">216.201.162[.]158:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/47.196.213.73%3A443\/\" target=\"_blank\" rel=\"noopener\">47.196.213[.]73:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/74.68.144.202%3A443\/\" target=\"_blank\" rel=\"noopener\">74.68.144[.]202:443<\/a><\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/136.232.34.70%3A443\/\" target=\"_blank\" rel=\"noopener\">136.232.34[.]70:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/186.154.175.13%3A443\/\" target=\"_blank\" rel=\"noopener\">186.154.175[.]13:443<\/a><\/td>\n<td><a href=\"https:\/\/opentip.kaspersky.com\/69.58.147.82%3A2078\/\" target=\"_blank\" rel=\"noopener\">69.58.147[.]82:2078<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><em><a id=\"footnote-1\">*<\/a> Can be performed as an external command (extended module).<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This report contains technical analysis of the Trojan-Banker named QakBot (aka QBot, QuackBot or Pinkslipbot) and its information stealing, web injection and other modules.<\/p>\n","protected":false},"author":[2556,515,2901],"featured_media":101599,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1044],"tags":[30,123,458,482,544,682,1305],"threat-category":[14,996],"coauthors":[1034,653,1306],"class_list":{"0":"post-103931","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-malware-descriptions","8":"tag-malware-technologies","9":"tag-malware-descriptions","10":"tag-malware","11":"tag-trojan-banker","12":"tag-trojan","13":"tag-malicious-spam","14":"tag-qakbot","15":"threat-category-spam-and-phishing","16":"threat-category-windows-malware","17":"securelist-post"},"acf":[],"banners":"","hreflang":[{"hreflang":"x-default","url":"https:\/\/securelist.com\/qakbot-technical-analysis\/103931\/"},{"hreflang":"ru","url":"https:\/\/securelist.ru\/qakbot-technical-analysis\/103485\/"},{"hreflang":"es","url":"https:\/\/securelist.lat\/qakbot-technical-analysis\/95162\/"}],"_links":{"self":[{"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/posts\/103931","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/users\/2556"}],"replies":[{"embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/comments?post=103931"}],"version-history":[{"count":24,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/posts\/103931\/revisions"}],"predecessor-version":[{"id":111897,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/posts\/103931\/revisions\/111897"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/media\/101599"}],"wp:attachment":[{"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/media?parent=103931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/categories?post=103931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/tags?post=103931"},{"taxonomy":"threat-category","embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/threat-category?post=103931"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/securelist.com\/wp-json\/wp\/v2\/coauthors?post=103931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}