{
	"id": "9b9980dd-bf5a-48e1-99df-aeae0cfa448d",
	"created_at": "2026-04-06T00:18:22.938174Z",
	"updated_at": "2026-04-10T13:12:28.373642Z",
	"deleted_at": null,
	"sha1_hash": "1314ecbfd86f1dc30a1a185df3a8d1a2e4f3eb15",
	"title": "\"aa\" distribution Qakbot (Qbot) infection with DarkVNC traffic",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 3049384,
	"plain_text": "\"aa\" distribution Qakbot (Qbot) infection with DarkVNC traffic\r\nBy SANS Internet Storm Center\r\nArchived: 2026-04-05 13:21:48 UTC\r\nChain of Events\r\nEmail --\u003e link --\u003e downloaded zip archive --\u003e extracted Excel file --\u003e enable macros --\u003e HTTPS traffic for\r\nQakbot DLL files --\u003e Qakbot C2 activity --\u003e DarkVNC traffic\r\nImages\r\nShown above:  Link from an email distributing Qakbot (\"aa\" distribution tag) in a web browser.\r\nhttps://isc.sans.edu/diary/rss/28568\r\nPage 1 of 6\n\nShown above:  Downloaded zip archive and extracted spreadsheet.\r\nShown above:  Qakbot DLL files saved to an infected Windows host.\r\nhttps://isc.sans.edu/diary/rss/28568\r\nPage 2 of 6\n\nShown above:  Traffic from the infection filtered in Wireshark.\r\nShown above:  TCP streams for DarkVNC traffic on 45.153.241[.]142 over TCP port 443.\r\nhttps://isc.sans.edu/diary/rss/28568\r\nPage 3 of 6\n\nShown above:  Qakbot traffic on 23.111.114[.]52 over TCP port 65400.\r\nIndicators of Compromise (IOCs)\r\nMalware from an infected Windows host:\r\nSHA256 hash: 685aa1d29540f5b63effec08fdf63f8bc7e995d1f15635cc1fd251bb7fb0dc73\r\nFile size: 1,093,506 bytes\r\nFile name: cocithoueqrta.zip\r\nFile location: hxxps://conta2000[.]cl/po/cocithoueqrta\r\nFile location: hxxps://conta2000[.]cl/po/A3105126785.zip\r\nFile description: zip archive downloaded from link in email\r\nSHA256 hash: 236b9d345a9b405c4850f880e1734712967d7cc34b176c270e78dd6f02f9839d\r\nFile size: 1,215,731 bytes\r\nFile name: J-233015633.xlsb\r\nFile description: Excel file with macro for Qakbot\r\nSHA256 hash: 74400f2acc98e59ddeba6d55da3ee0ea0c909eefdefeca4f1d3bf817a27b692b\r\nFile size: 1,385,866 bytes\r\nFile location: hxxps://debtsolversuk[.]co[.]uk/HLpeQJZi/NbVfNbhn.png\r\nhttps://isc.sans.edu/diary/rss/28568\r\nPage 4 of 6\n\nFile location: C:\\Rfgsg\\Jefseg.ooccxx\r\nFile description: Initial Qakbot DLL\r\nRun method: regsvr32.exe [filename]\r\nSHA256 hash: 29942eb47c0de0415b2507dff8822e3309dd4fcc2ac8d01434b37eb4f75efbe1\r\nFile size: 1,385,893 bytes\r\nFile location: hxxps://pablopereirasilvaluis[.]com[.]br/OHTvXEr9c/NbVfNbhn.png\r\nFile location: C:\\Rfgsg\\Jefsega.ooccxx\r\nRun method: regsvr32.exe [filename]\r\nSHA256 hash: 59fb3927427c68dee4c2f267f3ed4eea82dc07058061e06b3cd9b18d1a84b77f\r\nFile size: 1,385,920 bytes\r\nFile location: hxxps://portalregionpuno[.]com/088aFy0Xc8ap/NbVfNbhn.png\r\nFile location: C:\\Rfgsg\\Jefsegb.ooccxx\r\nRun method: regsvr32.exe [filename]\r\nTraffic for zip archive:\r\nhxxps://conta2000[.]cl/po/cocithoueqrta\r\nhxxps://conta2000[.]cl/po/A3105126785.zip\r\nTraffic for Qakbot DLL files:\r\nhxxps://debtsolversuk[.]co[.]uk/HLpeQJZi/NbVfNbhn.png\r\nhxxps://pablopereirasilvaluis[.]com[.]br/OHTvXEr9c/NbVfNbhn.png\r\nhxxps://portalregionpuno[.]com/088aFy0Xc8ap/NbVfNbhn.png\r\nQakbot post-infection traffic:\r\n189.146.73[.]62 port 443 - HTTPS traffic\r\n75.99.168[.]194 port 443 - HTTPS traffic\r\n37.252.0[.]102 port 443 - HTTPS traffic\r\nport 443 - www.openssl[.]org - HTTPS traffic (connectivity check, not inherently malicious)\r\n23.111.114[.]52 port 65400 - TCP traffic\r\nDark VNC traffic:\r\n45.153.241[.]142 port 443 - TCP traffic with encoded data.\r\nCertificate issuer data for Qakbot HTTPS traffic:\r\nCertificate issuer data for HTTPS traffic to 189.146.73[.]62:\r\nid-at-countryName=AU\r\nid-at-stateOrProvinceName=DA\r\nid-at-localityName=Ieiaegim\r\nhttps://isc.sans.edu/diary/rss/28568\r\nPage 5 of 6\n\nid-at-organizationName=Vuropti Mika Aguaugaf Inc.\r\nid-at-commonName=qchzpkuwhuh.org\r\nCertificate issuer data for HTTPS traffic to 75.99.168[.]194:\r\nid-at-countryName=AU\r\nid-at-stateOrProvinceName=WD\r\nid-at-localityName=Ntp\r\nid-at-organizationName=Venyec Giteg Xgsw Inc.\r\nid-at-commonName=onuwbkiz.us\r\nCertificate issuer data for HTTPS traffic to 37.252.0[.]102:\r\nid-at-countryName=US\r\nid-at-stateOrProvinceName=CA\r\nid-at-localityName=Los Angeles\r\nid-at-organizationName=vipsauna[.]com\r\nid-at-commonName=vipsauna[.]com\r\nFinal words\r\nA packet capture (pcap) of the infection traffic and the associated malware samples are available here.  The pcap is\r\nfrom an Active Directory (AD) environment.  The pcap been sanitized to disguise usernames, hostnames,\r\ndomains, internal IP addresses, the public IP address used to connect from my test lab to the Internet, and any\r\nother information that could identify the environment.\r\n---\r\nBrad Duncan\r\nbrad [at] malware-traffic-analysis.net\r\nSource: https://isc.sans.edu/diary/rss/28568\r\nhttps://isc.sans.edu/diary/rss/28568\r\nPage 6 of 6",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://isc.sans.edu/diary/rss/28568"
	],
	"report_names": [
		"28568"
	],
	"threat_actors": [],
	"ts_created_at": 1775434702,
	"ts_updated_at": 1775826748,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/1314ecbfd86f1dc30a1a185df3a8d1a2e4f3eb15.pdf",
		"text": "https://archive.orkl.eu/1314ecbfd86f1dc30a1a185df3a8d1a2e4f3eb15.txt",
		"img": "https://archive.orkl.eu/1314ecbfd86f1dc30a1a185df3a8d1a2e4f3eb15.jpg"
	}
}