In this video I analyze network traffic from a QakBot (QBot) infection in order to identify the Command-and-Control (C2) traffic. The analyzed PCAP file is from malware-traffic-analysis.net. IOC ListC2 IP and port: 80.47.61.240:2222C2 IP and port: 185.80.53.210:443QakBot proxy IP and port: 23.111.11[...]
Read the full writeup in the blog post QakBot C2 Traffic