QakBot (QBot) Campaign: A thorough Analysis

This article has been indexed from E Hacking News – Latest Hacker News and IT Security News

Trojan-Banker QakBot, also known by the names – QBot, QuackBot, and Pinkslipbot, is a modular information stealer that has been active for almost 14 years. With the key agenda of stealing banking credentials, QakBot employs various tools to evade detection and hamper manual analysis. The authors have developed the trojan with an aggressive sophistication that allows its variants to essentially deploy additional malware, create a backdoor to infected systems, and log user keystrokes. 
Typically, QakBot attacks contain MS Office Word documents that are deployed via phishing emails constructed to trick the user into accessing it. However, in 2020, some of the QakBot campaigns featured ZIP attachments that contained macros within the word document enclosed in the ZIP file. These macros are configured to trigger the execution of a PowerShell script that further downloads the QBot payload from selected internet addresses. 
Spoofing the Victim: Opening the QBot Infected Word Doc 
The word document which carries a malicious macro, once accessed by the victim, leads him to the Word Program on his system wherein he is asked to click on “Enable Content” shown in a yellow-colored dialogue box appearing right below the header. It reads “Security Warning” in bold letters. Once the user clicks onto it, it spoofs him into believing that it is taking its time to load data as another gray-colored dialogue box appears, reading “Loading data. Please wait…”
However, behind the scenes, the malicious Macro is being exe

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

Read the original article: QakBot (QBot) Campaign: A thorough Analysis