CISA and FBI Publish Joint Advisory on QakBot Infrastructure - 20230901002¶
Overview¶
CISA has released a joint advisory with FBI to disseminate QakBot infrastructure indicators of compromise (IOCs) identified through FBI investigations as of August 2023. This advisory aims to help organisations detect and protect against newly identified QakBot-related activity and malware.
Delivery¶
The delivery method for QakBot has been carried out mainly via phishing campaigns containing malicious attachments or links to download the malware, which would reside in memory once on the victim network.
Indicator of Compromise¶
The following list of IOC's can be used for detecting and identifying activity related to QakBot.
Registry Key(s) and Folder(s)¶
FBI has observed the following threat actor tactics, techniques, and procedures (TTPs) in association with QakBot infections:
-
QakBot sets up persistence via the Registry Run Key as needed. It will delete this key when running and set it back up before computer restart:
-
QakBot will also write its binary back to disk to maintain persistence in the following folder:
-
QakBot will write an encrypted registry configuration detailing information about the bot to the following registry key:
IP Address¶
The following IPs have been assessed to be linked to that platform, any communications to them should be inspected and assessed if it’s relevant to QakBot/malware activity:
IP Address | First Seen |
---|---|
85.14.243[.]111 | April 2020 |
51.38.62[.]181 | April 2021 |
51.38.62[.]182 | December 2021 |
185.4.67[.]6 | April 2022 |
62.141.42[.]36 | April 2022 |
87.117.247[.]41 | May 2022 |
89.163.212[.]111 | May 2022 |
193.29.187[.]57 | May 2022 |
193.201.9[.]93 | June 2022 |
94.198.50[.]147 | August 2022 |
94.198.50[.]210 | August 2022 |
188.127.243[.]130 | September 2022 |
188.127.243[.]133 | September 2022 |
94.198.51[.]202 | October 2022 |
188.127.242[.]119 | November 2022 |
188.127.242[.]178 | November 2022 |
87.117.247[.]41 | December 2022 |
190.2.143[.]38 | December 2022 |
51.161.202[.]232 | January 2023 |
51.195.49[.]228 | January 2023 |
188.127.243[.]148 | January 2023 |
23.236.181[.]102 | Unknown |
45.84.224[.]23 | Unknown |
46.151.30[.]109 | Unknown |
94.103.85[.]86 | Unknown |
94.198.53[.]17 | Unknown |
95.211.95[.]14 | Unknown |
95.211.172[.]6 | Unknown |
95.211.172[.]7 | Unknown |
95.211.172[.]86 | Unknown |
95.211.172[.]108 | Unknown |
95.211.172[.]109 | Unknown |
95.211.198[.]177 | Unknown |
95.211.250[.]97 | Unknown |
95.211.250[.]98 | Unknown |
95.211.250[.]117 | Unknown |
185.81.114[.]188 | Unknown |
188.127.243[.]145 | Unknown |
188.127.243[.]147 | Unknown |
188.127.243[.]193 | Unknown |
188.241.58[.]140 | Unknown |
193.29.187[.]41 | Unknown |
Recommended Remediation Steps¶
CISA and FBI recommend network defenders apply the following mitigations to reduce the likelihood of QakBot-related activity and promote identification of QakBot-induced ransomware and malware infections. Disruption of the QakBot botnet does not mitigate other already-installed malware or ransomware on victim computers.
Best Practice Mitigation Recommendations :
-
Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, and secure location
-
Require all accounts with password logins (e.g., service accounts, admin accounts, and domain admin accounts) to comply with NIST's standards when developing and managing password policies
-
Use phishing-resistant multi-factor authentication (MFA).
-
Keep all operating systems, software, and firmware up to date.
-
Segment networks to prevent the spread of ransomware.
-
Identify, detect, and investigate abnormal activity and potential traversal of the indicated malware with a networking monitoring tool.
-
Install, regularly update, and enable real time detection for antivirus software on all hosts.
-
Review domain controllers, servers, workstations, and active directories for new and/or unrecognized accounts.
-
Audit user accounts with administrative privileges and configure access controls.
-
Disable any unused network ports.
-
Consider adding an email banner to emails received from outside your organization.
-
Disable hyperlinks in received emails.
-
Implement time-based access for accounts set at the admin level and higher.
-
Disable command-line and scripting activities and permissions.
-
Perform regular secure system backups and create known good copies of all device configurations for repairs and/or restoration.
-
Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted), and covers the entire organization’s data infrastructure.
For more information on mitigations, please refer to CISA's Identification and Disruption of QakBot Infrastructure advisory.
Note: For situational awareness, the following SHA-256 hash is associated with FBI’s QakBot uninstaller:
Additional Resources:¶
- HHS: Qbot/QakBot Malware
- CISA: CPGs
- NIST: 800-63B Digital Identity Guidelines
- CISA: MFA
- CISA: Implementing Phishing-Resistant MFA
- CISA: Known Exploited Vulnerabilities Catalog
- CISA: Cyber Hygiene
- CISA: Zero Trust
- CISA: #StopRansomware
- CISA: #StopRansomware Guide
- CISA: CSET Tool Sets Sights on Ransomware Threat