2020-06-12 - QAKBOT (QBOT) SPX139 INFECTION WITH ZLOADER
NOTICE:
- The zip archives on this page have been updated, and they now use the new password scheme. For the new password, see the "about" page of this website.
 
ASSOCIATED FILES:
- 2020-06-12-IOCs-for-Qakbot-spx139-with-ZLoader.txt.zip 1.6 kB (1,591 bytes)
 - 2020-06-12-Qakbot-spx139-with-ZLoader-infection-traffic.pcap.zip 17.4 MB (17,362,131 bytes)
 - 2020-06-12-malware-and-artifacts-for-Qakbot-spx139-with-ZLoader.zip 9.4 MB (9,373,822 bytes)
 
IMAGES

Shown above:  Downloading the zip archive from a link in the malspam, and extacting the VBS file.

Shown above:  Traffic from the infection filtered in Wireshark.

Shown above:  Files in the AppData\Local\Temp folder seen during this infection.

Shown above:  Some of the decoy directories created by ZLoader.

Shown above:  Final location of ZLoader on the infected Windows host.

Shown above:  Qakbot persistent on the infected Windows host.
Click here to return to the main page.
