General

  • Target

    mihxuh.exe

  • Size

    288KB

  • Sample

    201103-lyr75w487s

  • MD5

    b196874e23f0e9f1c4e14014364691a1

  • SHA1

    6b2d426d71599cba5056f527e60a1d7e7ea65ef0

  • SHA256

    62af445f10bf41d073ccb92d3121a44608f394e4a2506a4027a3926c4524cad6

  • SHA512

    d52c8852fe0ad49a65de9ec12ea81c8d366b478c7885bcc898d21ff3e75ef06853cb806a1de7c15b325f9a9ad02f475dfba68324970600197f274fbf2043c23f

Malware Config

Extracted

Family

qakbot

Botnet

notset

Campaign

1596817234

Credentials

  • Protocol:
    ftp
  • Host:
    192.185.5.208
  • Port:
    21
  • Username:
    logger@dustinkeeling.com
  • Password:
    NxdkxAp4dUsY

  • Protocol:
    ftp
  • Host:
    162.241.218.118
  • Port:
    21
  • Username:
    logger@misterexterior.com
  • Password:
    EcOV0DyGVgVN

  • Protocol:
    ftp
  • Host:
    69.89.31.139
  • Port:
    21
  • Username:
    cpanel@vivekharris-architects.com
  • Password:
    fcR7OvyLrMW6!

  • Protocol:
    ftp
  • Host:
    169.207.67.14
  • Port:
    21
  • Username:
    cpanel@dovetailsolar.com
  • Password:
    eQyicNLzzqPN
C2

47.44.217.98:443

86.97.146.204:2222

65.60.228.130:443

216.201.162.158:443

94.59.24.79:995

108.46.145.30:443

24.139.132.70:443

47.206.174.82:443

188.52.106.206:20

72.204.242.138:6881

173.173.72.199:443

71.163.224.206:443

63.155.9.141:995

100.34.195.237:443

47.39.177.171:2222

96.20.108.17:2222

115.21.224.117:443

70.164.39.91:443

45.47.65.191:443

207.155.107.111:443

Targets

    • Target

      mihxuh.exe

    • Size

      288KB

    • MD5

      b196874e23f0e9f1c4e14014364691a1

    • SHA1

      6b2d426d71599cba5056f527e60a1d7e7ea65ef0

    • SHA256

      62af445f10bf41d073ccb92d3121a44608f394e4a2506a4027a3926c4524cad6

    • SHA512

      d52c8852fe0ad49a65de9ec12ea81c8d366b478c7885bcc898d21ff3e75ef06853cb806a1de7c15b325f9a9ad02f475dfba68324970600197f274fbf2043c23f

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Executes dropped EXE

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Tasks