The email GZ attachment contains a password-protected zip (not provided in the text), with an exe inside: the malware itself. It is not known what the next payload is.
Technical analysis by the Malware Hunter JAMESWT
Bitubit LLC is the last victim in Quakbot signed campaign
“Bitubit LLC” and Aqua Direct s.r.o have been used by cybercrime to spread Quakbot in a “signed” malspam campaign. The company certificates have being exploited to sign the attachment, an executable file. The objective is to decept the anti virus and let the victims download and install the malware through the attachment and a link. For this purpose organizations from different countries have been exploited. In the last period have been used many signatures. They include those related to:
Mislean Software Limited
Master Networking s.r.o.
DocsGen Software Solutions Inc.
Digital Capital Management Ireland Limited
Equal Cash Technologies Limited
Korist Networks Incorporated
Akhirah Technologies Inc.
Bamboo Connect s.r.o.
OLIMP STROI OOO
Cubic Information Systems UAB
Highweb Ireland Operations Limited
THREE D CORPORATION PTY LTD
SERVICE STREAM LIMITED
ABEL RENOVATIONS, INC
TRAUMALAB INTERNATIONAL APS
APP DIVISION ApS
FORTUNE STAR TRADING, INC
Aqua Direct s.r.o
The malware is a banking trojan with worm capabilites
QuakBot (aka Qbot) malware is a modular cybercrime banking trojan known to target businesses to steal money from their online banking accounts. It features worm capabilities to self-replicate through shared drives and removable media. The code uses powerful information-stealing features to spy on users’ banking activity.