Qakbot (Qbot) — This password-stealing malware just evolved a new tactic to remain hidden

Discussion in 'malware problems & news' started by guest, May 3, 2019.

  1. guest

    guest Guest

    This password-stealing malware just evolved a new tactic to remain hidden
    Windows malware campaign re-emerges with new techniques for attempting to stay under the radar
    May 3, 2019
    https://www.zdnet.com/article/this-...e-just-evolved-a-new-tactic-to-remain-hidden/
    Cisco Talos: Qakbot levels up with new obfuscation techniques
     
  2. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,367
    Location:
    Italy
    This is the classic example of a problem where Windows XP is immune.
     
  3. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    How is XP immune from this?

    It runs scheduled tasks, cmd.exe, and wscript.exe all components in this attack.
     
  4. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,367
    Location:
    Italy
    In Italy it's 9:25 pm we'll talk about it tomorrow, in my late afternoon:

    800.JPG
     
  5. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    Windows Task Scheduler, i.e. schtask.exe, is located in C:\Windows\System32 directory for starters.

    Next open a command prompt windows as admin. Where does it point to?

    Cmd_Prompt.png

    Believe you got confused with this .bat code:

    untitled.png

    Once way the .bat script could run on XP is with admin privileges. I believe on XP does not the default account run w/full admin privileges?

    Also I am confused by your command prompt display on XP. If I recollect is not the \Documents and Settings\User directory the equal to my below screen shot for non-admin command prompt on Win 10? In any case, specifying the full path name should do the trick. Or add, "cd C:\Windows\System32" to the script prior to the schtask.exe script code line.

    In reality though, the malware authors probably assume no in in their right mind is still using Win XP for any kind of Internet financial activities. Therefore, you might be indeed immune from this.

    Cmd_Prompt_2.png
     
    Last edited: May 4, 2019
  6. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,367
    Location:
    Italy
    The cmd prompt is already at the administrator level.
    No confusion, there is no Schtask.exe in System32.

    Regarding the command prompt path, the path is regular.
    I recently added some specific custom commands to the winapp2.ini (CCleaner) file for my New Moon (no installer) and Interlink MailNews (no installer) and I had to be careful about environment variables like see different XP and Vista / W .10:

    Environment variables:

    https://github.com/MoscaDotTo/Winapp2



    XP is immune,period.
     
    Last edited: May 5, 2019
  7. roger_m

    roger_m Registered Member

    Joined:
    Jan 25, 2009
    Posts:
    8,626
    In XP, it's mstask.exe, not schtasks.exe, so you are right, it won't run.
     
  8. Sampei Nihira

    Sampei Nihira Registered Member

    Joined:
    Apr 7, 2013
    Posts:
    3,367
    Location:
    Italy
    Certainly.
    Thank you for the confirmation.;):thumb:
    And there are multiple other factors why today's malware won't run on Windows XP.
     
  9. itman

    itman Registered Member

    Joined:
    Jun 22, 2010
    Posts:
    8,593
    Location:
    U.S.A.
    A few finally comments.

    To begin with, Qatbot and like class financial malware doesn't target individual's; its targets are financial institutions and concerns. So the discussion of whether a standalone XP PC is vulnerable or not is immaterial.

    That said, don't fool yourself that if an attacker of this class wants to attack a source, he won't first perform recon activities on the target in regards to system particulars and then delivery the appropriate payload.
     
  10. guest

    guest Guest

    Targeting U.S. banks, Qbot trojan evolves with new evasion techniques
    June 15, 2020
    https://www.scmagazine.com/home/sec...t-trojan-evolves-with-new-evasion-techniques/
    F5 Labs: Qbot Banking Trojan Still Up to Its Old Tricks
     
  11. guest

    guest Guest

    New QakBot Campaign Is Showcasing Novel Detection Evasion Techniques
    The QakBot banking trojan has broken its malicious functionality into chunks, and AVs have trouble detecting it
    August 21, 2020

    https://www.technadu.com/new-qakbot-campaign-showcasing-novel-detection-evasion-techniques/179285/
    Morphisec: QakBot (QBot) Maldoc Campaign Introduces Two New Techniques into Its Arsenal
     
  12. guest

    guest Guest

    Fortinet:
    Deep Analysis of a QBot Campaign – Part I (June 11, 2020)
    Deep Analysis of a QBot Campaign - Part II (July 8, 2020)
     
  13. guest

    guest Guest

    Your email threads are now being hijacked by the QBot Trojan
    Operators have changed their tactics in the quest for data theft
    August 27, 2020

    https://www.zdnet.com/article/your-email-threads-are-now-being-hijacked-by-qbot-trojan/
    Check Point Research: An Old Bot’s Nasty New Tricks: Exploring Qbot’s Latest Attack Methods
     
  14. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
  15. guest

    guest Guest

    Qbot malware switched to stealthy new Windows autostart method
    December 9, 2020
    https://www.bleepingcomputer.com/ne...hed-to-stealthy-new-windows-autostart-method/
    Binary Defense: Qakbot Upgrades To Stealthier Persistence Method
     
  16. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,885
    Location:
    Slovenia, EU
    QakBot technical analysis
    https://securelist.com/qakbot-technical-analysis/
     
  17. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    What I found most interesting is that QakBot needs to perform code injection in order to install the hooking module. This hooking module is used to perform web injects, record keyboard input and sniff on network traffic. However I'm not sure how other moules like the cookies and password grabber work, I wonder if it simply searches for files on disk? This stuff should be explained more clearly.
     
  18. guest

    guest Guest

    Researchers Uncover New Attempts by Qakbot Malware to Evade Detection
    July 12, 2022
    Zscaler: Rise in Qakbot attacks traced to evolving threat techniques
     
  19. guest

    guest Guest

    QBot phishing uses Windows Calculator sideloading to infect devices
    July 24, 2022
    Cyble: Qakbot Resurfaces With New Playbook
     
  20. guest

    guest Guest

    Qakbot Attack Uses Email Threads Hijacked From ProxyLogon Compromises
    July 29, 2022
    Cisco Talos: What Talos Incident Response learned from a recent Qakbot attack hijacking old email threads
     
  21. guest

    guest Guest

    June 2022 Qakbot Campaign
    August 29, 2022
     
  22. guest

    guest Guest

    Surge of QakBot Activity Using Malspam, Malicious XLSB Files
    September 6, 2022
     
  23. guest

    guest Guest

    QBot phishing abuses Windows Control Panel EXE to infect devices
    By Lawrence Abrams @LawrenceAbrams - November 17, 2022
     
  24. guest

    guest Guest

    An aggressive malware campaign targets US-based companies with Qakbot to deliver Black Basta Ransomware
    By Pierluigi Paganini - November 24, 2022
    Cybereason: THREAT ALERT: Aggressive Qakbot Campaign and the Black Basta Ransomware Group Targeting U.S. Companies
     
  25. guest

    guest Guest

    New QakNote attacks push QBot malware via Microsoft OneNote files
    By Bill Toulas @billtoulas - February 7, 2023
    Sophos: Qakbot mechanizes distribution of malicious OneNote notebooks
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.