Member-only story

QBot/QakBot Malware: How does it work?

Akshay Prasad
3 min readApr 21, 2024

Qbot, also known as "QakBot,” is malware originally designed as a banking trojan to steal financial information. Its modular design enables it to transport and install malicious software on computers in a variety of ways. QakBot attacks result in a massive botnet of compromised machines under the adversary's or attackers' control.

Qbot spreads via email with unusual attachments. The email or infected email is usually distributed through phishing, spam, or compromised accounts. This would trick the user into opening the email and downloading the attachments.

I will illustrate some sample cases of how Qbot gets activated, which are as follows:

Case 1: The file is distributed via email and Qbot activates via PowerShell

The initial access begins by sending out the deceiving email, which appears to be a legitimate email. Once the email is opened, the associated disguising file, such as a batch file (*.bat), a Windows script file (*.wsf), a Javascript file (*.jse), or an embedded HTML file (*.HTA), will be dropped on the system/host. The scripts, as mentioned earlier, download the DLL file, copy it to the “tmp” folder, and execute using "rundll32.exe.”

Note:

Rundll32.exe is a…

--

--

Akshay Prasad
Akshay Prasad

Written by Akshay Prasad

I am a cyber security enthusiast and an experienced SOC Analyst who helps organisations contain and mitigate threats.

No responses yet