{"id":109535,"date":"2023-04-17T10:00:46","date_gmt":"2023-04-17T10:00:46","guid":{"rendered":"https:\/\/kasperskycontenthub.com\/securelist\/?p=109535"},"modified":"2023-04-26T13:26:08","modified_gmt":"2023-04-26T13:26:08","slug":"qbot-banker-business-correspondence","status":"publish","type":"post","link":"https:\/\/securelist.com\/qbot-banker-business-correspondence\/109535\/","title":{"rendered":"QBot banker delivered through business correspondence"},"content":{"rendered":"
In early April, we detected a significant increase in attacks that use banking Trojans of the QBot family (aka QakBot, QuackBot, and Pinkslipbot). The malware would be delivered through e-mail letters written in different languages\u00a0\u2014 variations of them were coming in English, German, Italian, and French. The messages were based on real business letters the attackers had gotten access to, which afforded them the opportunity to join the correspondence thread with messages of their own. As a general rule, such letters would be urging the addressee\u00a0\u2014 under a plausible pretext\u00a0\u2014 to open an enclosed PDF file. As an example, they could be asking to provide all the documentation pertaining to the attached application or to calculate the contract value based on the attached cost estimate.<\/p>\n
<\/a><\/p>\n Example of a forwarded letter containing a malicious attachment<\/em><\/strong><\/p>\n Such simulated business correspondence can obstruct spam tracking while increasing the probability of the victim falling for the trick. For authenticity, the attackers put the sender’s name from the previous letters in the ‘From’ field; however, the sender’s fraudulent e-mail address will be different from that of the real correspondent.<\/p>\n The banking Trojan QBot was detected for the first time in 2007. Since then, it has gone through multiple modifications and improvements to become one of the most actively spread malware in 2020. In 2021, we published a detailed QBot technical analysis<\/a>. Currently the banker keeps getting new functions and module updates for increased effectiveness and profit.<\/p>\n QBot distribution methods have also evolved. Early on it was distributed through infected websites and pirated software. Now the banker is delivered to potential victims through malware already residing on their computers, social engineering, and spam mailings.<\/p>\n <\/a><\/p>\n New QBot infection chain<\/em><\/strong><\/p>\n The QBot malware delivery scheme begins with an e-mail letter with a PDF file in the attachment being sent. The document’s content imitates a Microsoft Office 365 or Microsoft Azure alert advising the user to click Open to view the attached files. If the user complies, an archive will be downloaded from a remote server (compromised site), protected with a password given in the original PDF file.<\/p>\nA short look at QBot<\/h2>\n
QBot infection chain<\/h2>\n