Products and Services PRODUCTS & SERVICES

New QakBot C2 servers detected with Sophos NDR

Sophos NDR updates detected two new QakBot servers that had not yet been publicly identified.

As malware continues to evolve and adversaries become more adept at evading detection, dynamic AI and machine learning technologies are critical for detection of the latest threats and attacks.

Sophos NDR utilizes a series of machine learning models that are regularly retrained to account for evolving malware families. This approach allows Sophos NDR to identify new malware variants operating covertly deep within the network, even within encrypted traffic, that may be attempting to make calls to previously unidentified command and control servers. 

Recently, Sophos NDR updates detected two new QakBot servers that had not yet been publicly identified. These servers were being used by threat actors to manage and control QakBot infections, a banking trojan that has been active since 2008 and primarily targets financial institutions and their customers.

The detection of these new QakBot servers highlights the ongoing threat posed by banking trojans and the need for advanced threat detection and response capabilities. Sophos NDR’s detection of the QakBot servers using encrypted packet analysis technology demonstrates the importance of analyzing encrypted traffic to identify advanced threats.

Sophos NDR’s encrypted packet analysis (EPA) technology allows it to detect potential threats without relying on decrypted content. In the table below, you can see the details of the two newly discovered QakBot servers, including the EPA model confidence, detected malware family, flow risks, and TLS information.

Detection IP Address Port EPA Model Confidence Malware Family Flow Risks TLS Info Virus Total Details Other
QakBot C2 Server 142.118.95.50 2222  99.014% QakBot, Qbot, Quakbot KNOWN_PROTOCOL_ON_NON_STANDARD_PORT
TLS_NOT_CARRYING_HTTPS
TLS_MISSING_SNI
TLS version 1.2
Cipher: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
JA3C: 72a589da586844d7f0818ce684948eea
JA3S: fd4bc6cea4877646ccd62f0792ec0b62
JARM: 21d14d00021d21d21c42d43d0000007abc6200da92c2a1b69c0a56366cbe21
https://www.virustotal.com/gui/ip-address/142.118.95.50/community Unpopular Destination
QakBot C2 Server 173.18.122.24 443 98.509% QakBot, Qbot, Quakbot TLS_NOT_CARRYING_HTTPS
TLS_MISSING_SNI
TLS version 1.2
Cipher: TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384
JA3C: 72a589da586844d7f0818ce684948eea
JA3S: fd4bc6cea4877646ccd62f0792ec0b62
JARM: 21d14d00021d21d21c42d43d0000007abc6200da92c2a1b69c0a56366cbe21
https://www.virustotal.com/gui/ip-address/173.18.122.24/community Unpopular Destination

There have been several cybercriminal groups that have been associated with using QakBot in the past. Some of the notable groups include:

  • Evil Corp: This Russian cybercrime group is known for deploying various banking trojans, including QakBot. They have been linked to several high-profile attacks on financial institutions, with the primary goal of stealing large sums of money.
  • TA505: This group is believed to be based in Eastern Europe and is known for conducting large-scale phishing campaigns to distribute QakBot and other malware. They are also associated with the Dridex banking trojan and the Locky ransomware.
  • FIN7: This group is known for targeting hospitality, restaurant, and retail industries using phishing emails and deploying QakBot and other malware to steal payment card data. They have also been linked to the Carbanak and Cobalt Strike malware.
The Sophos NDR EPA model converts packet flows to images and uses a neural network to determine if the image matches what we expect QakBot to look like.  For those interested in what that image looks like I have included them here.
For more information on the Sophos NDR product, please check out the Sophos NDR Explained whitepaper.