Researchers at Cisco Talos were the first to find that Quabot Trojan has been updated and changed. Qakbot now schedules tasks in the compromised systems to download the malware’s binary. This task will execute a JavaScript downloader that makes a binary request to multiple hijacked domains, getting the full binary after multiple requests. The malware will then resemble itself on the compromised system, following it with a relaunch after each system restart so as to avoid removal. An unaware av tool’s result may allow this malware to be downloaded and slip past guards.”]

