Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV //

Malware

// // //
3/5/2019
07:45 AM
Larry Loeb
Larry Loeb
Larry Loeb

Qbot Mutation Poses Global Threat

Once again, we can see how malware change will defeat static signature analysis.

A malware that is a decade old has mutated, and is once again a global threat. Qbot (alternatively called Qakbot) is financially oriented malware first seen in 2009 as a Trojan designed to steal online banking credentials.

It is classified as a semi-polymorphic threat since its command-and-control servers will scramble the code and configuration periodically to evade signature-based antivirus detection. Once again, we can see how malware change will defeat static signature analysis.

There are also worm-like capabilities in it that help it to move laterally through networks through brute-forcing Windows domain credentials. This means it can infect other Windows systems. Things start out with a phishing email. Security firm Varonis (which found the current version of the malware and wrote it up) thinks that that the victim is lured into running the malicious VBS file that is attached to the email.

The VBS extracts the OS version of the victim's machine and attempts to detect common antivirus software installed on the system like Defender, Virus, Antivirus, Malw, Trend, Kaspersky, Kav, Mcafee and Symantec.

BITSAdmin, rather than PowerShell which was previously used, downloads the malware's loader.

The multiple version loader executes the core malware. It is constantly updating even after execution.

The loader is digitally signed to increase the appearance of trustworthiness, and each version of the loader is signed with a different digital certificate.

When first run, the loader copies itself to %Appdata%\Roaming\{Randomized String} and creates a shortcut in the Startup folder to gain persistence.

The loader then goes on to launch a 32-bit explorer.exe process and then injects the main payload as a RWX memory segment.

At this point, it begins recording all the keystrokes typed by users along with stealing credentials and authentication cookies saved inside browsers. Not only that, it will hook financial API calls and then inject code into other processes that will search for (and steal) financial-related text strings.

After that, it tries to move out to the network. Authentication attempts use NTLM, and the API WNetAddConnection.

Varonis found 2,726 unique victim IP addresses on a control server ( content[dot]bigflimz[dot]co) associated with the malware. But Varonis notes that, "As many organizations use port address translation that masks internal IP addresses, the number of victims is likely much larger."

The server also showed that 1,700 of the victims were located in the US Others were also found in Canada, the UK, Germany, France, Brazil, South Africa, India, China and Russia.

Other Indicators of Compromise (IOCs) were supplied in Varonis's blog post describing the malware.

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Black Hat USA 2022 Attendee Report
Black Hat attendees are not sleeping well. Between concerns about attacks against cloud services, ransomware, and the growing risks to the global supply chain, these security pros have a lot to be worried about. Read our 2022 report to hear what they're concerned about now.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-38188
PUBLISHED: 2022-08-15
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.9.1 which may allow a remote attacker able to convince a user to click on a crafted link which could potentially execute arbitrary JavaScript code in the victim’s browser.
CVE-2022-38190
PUBLISHED: 2022-08-15
A stored Cross Site Scripting (XSS) vulnerability in Esri Portal for ArcGIS configurable apps may allow a remote, unauthenticated attacker to pass and store malicious strings via crafted queries which when accessed could potentially execute arbitrary JavaScript code in the userââ&...
CVE-2022-38191
PUBLISHED: 2022-08-15
There is an HTML injection issue in Esri Portal for ArcGIS versions 10.9.0 and below which may allow a remote, authenticated attacker to inject HTML into some locations in the home application.
CVE-2022-35822
PUBLISHED: 2022-08-15
Windows Defender Credential Guard Security Feature Bypass Vulnerability. This CVE ID is unique from CVE-2022-34709.
CVE-2022-38186
PUBLISHED: 2022-08-15
There is a reflected XSS vulnerability in Esri Portal for ArcGIS versions 10.8.1 and below which may allow a remote attacker able to convince a user to click on a crafted link which could potentially execute arbitrary JavaScript code in the victim’...