Sunday, January 24, 12:21
Home security Emotet botnet spreads malicious QakBot software

Emotet botnet spreads malicious QakBot software

Researchers monitoring the Emotet botnet have noticed that malware has begun to push the QakBot banking trojan at an unusually high rate, replacing the TrickBot payload it has been using for years.

Last week, Emotet returned to active action after a five-month hiatus. As of yesterday, the operation of malspam started for a while the installation of TrickBot on violated Windows systems.

Things changed today when researchers noticed that Emotet was spreading QakBot. A string in the malware indicates that this trojan is now the partner that chose the Emotet botnet.

A team of researchers and system administrators who have come together to fight Emotet companies called Cryptolaemus, saw today that the menacing factor replaced the TrickBot distribution in all "epochs".

Emotet botnet QakBot

An Emotet epoch is a subset of the botnet that operates on a separate infrastructure. Currently, there are three of them, each with separate ones servers orders and control, distribution methods and payloads.

Speaking to BleepingComputer, the Cryptolaemus team said it saw QakBot distributed throughout Emotet's botnet, as TrickBot was completely absent.

A security researcher named Bom spotted a sample of QakBot (QBot) malware and "passed it on" to the interactive analysis tool Any.Run. Results are available on this link. A list of command and control server addresses (C2) is available here.

Additional analysis by cybercrime intelligence company Intel 471 revealed that the string for this QBot campaign is "partner01", indicating a strong connection between Emotet and these threats.

However, drawing quick conclusions about the non-cooperation of Emotet and TrickBot is not safe as the relationship between these two operators is not exclusive. The Cryptolaemus team said the change to one payload has happened in the past and that the original duo is very likely to continue their collaboration.

However, this does not happen very often. For example, Emοtet started using QakBot last year.

TrickBot and QakBot are the preferred partners for Emotet. All three hackers are part of the same Russian-speaking community and have been interacting for a long time.

It is not clear what QakBot distributes to infected systems, but some victims may fall victim to ransomware.

To learn more about Emotet campaigns, you can follow Cryptolaemus's Twitter profile.

Even though there is a different payload, Emotet still relies on emails to distribute malware, with threatening to be delivered via some malicious document.


Please enter your comment!
Please enter your name here

Teo Ehc
Teo Ehc
Be the limited edition.


Signal: How to check if your messages are private and secure?

The Signal messaging application has suddenly gained a large number of new users, which is due to the recent "scandal" of WhatsApp, which announced ...

Instagram: How to enable notifications for specific profiles

There are some profiles on Instagram where you want to see the content they publish as soon as possible - it can be a news ...

NASA's historic launch pad is to be demolished

NASA's famous Mobile Launcher Platform-2 launch platform, which has been linked to the Apollo and Space Shuttle missions, ...

Elon Musk: Gives $ 100 million for best CO2 capture technology Ο Elon Musk δήλωσε χθες, στο λογαριασμό του στο Twitter, ότι σκοπεύει να δώσει 100 εκατομμύρια...

How can you unblock sites and services using a VPN?

The Internet is free and open to all. However, there are some sites and services whose content is blocked, which ...

Google Chrome: How to manage your extensions?

Google Chrome extensions can be very useful, as they improve your productivity when using the browser.

Intel CPUs Review: Core i7-10700 vs Core i7-10700K!

Over the years, the Intel series of processors (CPUs) introduced the series of overclocking models "K" and more recently the series ...

The DeLorean can return as an electric car

The DMC DeLorean has been out of production for almost 40 years, but it looks like the iconic vehicle will return as an electric car.

Windows RDP servers are used to support DDoS

Cybercrime gangs are abusing Windows Remote Desktop Protocol (RDP) systems to reinforce the unwanted ...

SEPA: He refused to pay a ransom and thousands of files were leaked

Thousands of stolen files of the Scottish Environmental Protection Agency (SEPA) have been published by hackers, after the organization refused to pay the ransom ...