c87c90e4ca093cb6ee55d605f08d1f679df35ebfe7943ffeef41ab1d2e7e39a0

General
Target

c87c90e4ca093cb6ee55d605f08d1f679df35ebfe7943ffeef41ab1d2e7e39a0

Size

251KB

Sample

201125-eg6gql1m4a

Score
10 /10
MD5

72b04f20620bb64d6bda9c686bb40293

SHA1

ef703a478a04faa9f6dcee402aafb4012570771a

SHA256

c87c90e4ca093cb6ee55d605f08d1f679df35ebfe7943ffeef41ab1d2e7e39a0

SHA512

29897436a59cd223c751c2b1241dd5606d7b9b6eaf92f418927ea4a722112013664dd8c787a8d93923c74903296a5839bda293dc5a7cca20e3d40169b4491ce6

Malware Config

Extracted

Family qakbot
Botnet abc100
Campaign 1606207839
C2

37.6.223.237:995

2.51.246.190:995

37.211.86.156:443

42.201.228.106:995

50.29.166.232:995

102.185.58.126:443

81.133.234.36:2222

2.50.89.158:995

79.166.83.103:2222

173.245.152.231:443

2.86.41.23:2222

93.151.180.170:61202

24.179.13.119:443

24.152.219.253:995

105.198.236.99:443

24.205.42.241:443

176.58.132.212:2222

151.73.126.156:443

94.52.68.72:443

47.146.169.85:443

99.234.121.250:443

184.66.18.83:443

68.186.192.69:443

216.215.77.18:2222

199.116.241.147:443

68.174.15.223:443

180.233.150.134:443

134.0.196.46:995

85.60.132.8:2078

185.105.131.233:443

77.27.174.49:995

72.204.242.138:443

77.30.214.26:443

83.110.226.174:443

78.101.234.58:443

69.11.247.242:443

100.12.74.21:995

78.101.21.73:443

71.213.39.66:443

83.110.111.159:2078

72.183.129.56:443

185.246.9.69:995

90.91.5.98:2222

68.225.60.77:995

71.79.144.56:443

90.174.217.251:2222

79.117.140.145:443

83.110.150.186:443

5.15.225.109:443

47.138.204.19:443

Targets
Target

c87c90e4ca093cb6ee55d605f08d1f679df35ebfe7943ffeef41ab1d2e7e39a0

MD5

72b04f20620bb64d6bda9c686bb40293

Filesize

251KB

Score
10 /10
SHA1

ef703a478a04faa9f6dcee402aafb4012570771a

SHA256

c87c90e4ca093cb6ee55d605f08d1f679df35ebfe7943ffeef41ab1d2e7e39a0

SHA512

29897436a59cd223c751c2b1241dd5606d7b9b6eaf92f418927ea4a722112013664dd8c787a8d93923c74903296a5839bda293dc5a7cca20e3d40169b4491ce6

Tags

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                    Privilege Escalation