f62a0056f40817cf0151b6feb780b1d55dfc8b3ec522aaca632f0544a3fc51c2

General
Target

f62a0056f40817cf0151b6feb780b1d55dfc8b3ec522aaca632f0544a3fc51c2

Size

251KB

Sample

201125-g1mqaad5fe

Score
10 /10
MD5

9475d88ad81689f19044728026bd00c7

SHA1

d092f60012800007c541d42e5d4208b306204f4c

SHA256

f62a0056f40817cf0151b6feb780b1d55dfc8b3ec522aaca632f0544a3fc51c2

SHA512

9957b6d1df689576b65d1bd9706744377d395303c332764fbf150fbd0b76126a75dc8fd430efe8b55244425e2906e19140c987c322232ad25d41f9c433bc6d0b

Malware Config

Extracted

Family qakbot
Botnet abc100
Campaign 1606207839
C2

37.6.223.237:995

2.51.246.190:995

37.211.86.156:443

42.201.228.106:995

50.29.166.232:995

102.185.58.126:443

81.133.234.36:2222

2.50.89.158:995

79.166.83.103:2222

173.245.152.231:443

2.86.41.23:2222

93.151.180.170:61202

24.179.13.119:443

24.152.219.253:995

105.198.236.99:443

24.205.42.241:443

176.58.132.212:2222

151.73.126.156:443

94.52.68.72:443

47.146.169.85:443

99.234.121.250:443

184.66.18.83:443

68.186.192.69:443

216.215.77.18:2222

199.116.241.147:443

68.174.15.223:443

180.233.150.134:443

134.0.196.46:995

85.60.132.8:2078

185.105.131.233:443

77.27.174.49:995

72.204.242.138:443

77.30.214.26:443

83.110.226.174:443

78.101.234.58:443

69.11.247.242:443

100.12.74.21:995

78.101.21.73:443

71.213.39.66:443

83.110.111.159:2078

72.183.129.56:443

185.246.9.69:995

90.91.5.98:2222

68.225.60.77:995

71.79.144.56:443

90.174.217.251:2222

79.117.140.145:443

83.110.150.186:443

5.15.225.109:443

47.138.204.19:443

Targets
Target

f62a0056f40817cf0151b6feb780b1d55dfc8b3ec522aaca632f0544a3fc51c2

MD5

9475d88ad81689f19044728026bd00c7

Filesize

251KB

Score
10 /10
SHA1

d092f60012800007c541d42e5d4208b306204f4c

SHA256

f62a0056f40817cf0151b6feb780b1d55dfc8b3ec522aaca632f0544a3fc51c2

SHA512

9957b6d1df689576b65d1bd9706744377d395303c332764fbf150fbd0b76126a75dc8fd430efe8b55244425e2906e19140c987c322232ad25d41f9c433bc6d0b

Tags

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                    Privilege Escalation