Skip to content
This repository was archived by the owner on Nov 16, 2023. It is now read-only.

Commit 4448489

Browse files
committed
added qakbot to defense evasion dir
1 parent 663df1e commit 4448489

File tree

1 file changed

+50
-0
lines changed

1 file changed

+50
-0
lines changed
Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
# Defense evasion by campaigns using Qakbot malware
2+
3+
This query was originally published in the threat analytics report, *Qakbot blight lingers, seeds ransomware*
4+
5+
Qakbot is malware that steals login credentials from banking and financial services. It has been deployed against small businesses as well as major corporations. Some outbreaks have involved targeted ransomware campaigns that use a similar set of techniques. Links to related queries are listed under [#see-also].
6+
7+
The following query detects if an instance of Qakbot has attempted to overwrite its original binary.
8+
9+
## Query
10+
11+
```Kusto
12+
DeviceProcessEvents
13+
| where FileName =~ "ping.exe"
14+
| where InitiatingProcessFileName =~ "cmd.exe"
15+
| where InitiatingProcessCommandLine has "calc.exe" and
16+
InitiatingProcessCommandLine has "-n 6"
17+
and InitiatingProcessCommandLine has "127.0.0.1"
18+
| project ProcessCommandLine, InitiatingProcessCommandLine,
19+
InitiatingProcessParentFileName, DeviceId, Timestamp
20+
```
21+
22+
## Category
23+
24+
This query can be used to detect the following attack techniques and tactics ([see MITRE ATT&CK framework](https://attack.mitre.org/)) or security configuration states.
25+
26+
| Technique, tactic, or state | Covered? (v=yes) | Notes |
27+
|-|-|-|
28+
| Initial access | | |
29+
| Execution | | |
30+
| Persistence | | |
31+
| Privilege escalation | | |
32+
| Defense evasion | v | |
33+
| Credential Access | | |
34+
| Discovery | | |
35+
| Lateral movement | | |
36+
| Collection | | |
37+
| Command and control | | |
38+
| Exfiltration | | |
39+
| Impact | | |
40+
| Vulnerability | | |
41+
| Misconfiguration | | |
42+
| Malware, component | | |
43+
44+
## See also
45+
46+
47+
48+
## Contributor info
49+
50+
**Contributor:** Microsoft Threat Protection team

0 commit comments

Comments
 (0)