acaf0b60acb73370b7ebf96ecbfd947da545dda84413333ca918cb46cca87f7e.dll

General
Target

acaf0b60acb73370b7ebf96ecbfd947da545dda84413333ca918cb46cca87f7e.dll

Size

255KB

Sample

201125-a2cjkw8vbj

Score
10 /10
MD5

056ae65f93e17decca62525ac9067970

SHA1

fbefcf270c61e7108d1e5b6124d299c741ea6acf

SHA256

acaf0b60acb73370b7ebf96ecbfd947da545dda84413333ca918cb46cca87f7e

SHA512

73f58f97d3563bd3775884ae88c00254f469ce49177a32866d3f341ed2857ba55bd2aba4d4f816c7fa5c2000833a1b11340f25cc77a305b9f8cf4257a105f7a1

Malware Config

Extracted

Family qakbot
Botnet abc101
Campaign 1606294013
C2

98.115.243.237:443

78.101.21.73:443

185.163.221.77:2222

2.51.246.190:995

2.50.2.11:995

175.137.79.81:443

42.201.228.106:995

185.246.9.69:995

81.133.234.36:2222

24.205.42.241:443

73.239.229.107:995

102.185.58.126:443

173.245.152.231:443

105.101.216.210:443

89.137.195.167:995

174.76.21.134:443

41.238.217.126:6881

47.138.204.19:443

79.166.83.103:2222

92.154.83.96:1194

83.110.111.159:443

203.106.195.67:443

68.225.60.77:995

90.174.217.251:2222

73.166.10.38:995

83.110.226.174:443

109.177.80.59:2222

174.29.203.226:993

122.59.40.31:995

47.22.148.6:443

196.204.207.111:443

105.198.236.99:443

185.105.131.233:443

200.75.136.78:443

2.86.41.23:2222

83.196.50.197:2222

78.96.199.79:443

86.99.134.235:2222

109.106.69.138:2222

59.99.36.38:443

72.204.242.138:443

103.76.160.110:443

59.99.38.33:443

121.58.199.24:443

216.201.162.158:443

173.197.22.90:2222

217.165.2.92:995

83.110.13.182:2222

76.181.122.120:443

94.141.3.242:443

Targets
Target

acaf0b60acb73370b7ebf96ecbfd947da545dda84413333ca918cb46cca87f7e.dll

MD5

056ae65f93e17decca62525ac9067970

Filesize

255KB

Score
10 /10
SHA1

fbefcf270c61e7108d1e5b6124d299c741ea6acf

SHA256

acaf0b60acb73370b7ebf96ecbfd947da545dda84413333ca918cb46cca87f7e

SHA512

73f58f97d3563bd3775884ae88c00254f469ce49177a32866d3f341ed2857ba55bd2aba4d4f816c7fa5c2000833a1b11340f25cc77a305b9f8cf4257a105f7a1

Tags

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                    Privilege Escalation