f2ec4d6a4cf9e3a9ffd51292ca722f8e4cb860e047bea963e5d76f94221e184a

General
Target

f2ec4d6a4cf9e3a9ffd51292ca722f8e4cb860e047bea963e5d76f94221e184a

Size

251KB

Sample

201125-nlyz3s6ktj

Score
10 /10
MD5

a710a42b010bc82a53107a73f6e0d0ef

SHA1

5f0f2c19bb57f164c49b02c6bb066b1e27779c6c

SHA256

f2ec4d6a4cf9e3a9ffd51292ca722f8e4cb860e047bea963e5d76f94221e184a

SHA512

6e7f5de74a2fed73cae068c3e8a196630d2257c5b213d6f3ba6887bffc0ee829c34fae2061d8bf89594ee5f8da88645bba24cf8301cc271757b68344882b18dc

Malware Config

Extracted

Family qakbot
Botnet abc100
Campaign 1606207839
C2

37.6.223.237:995

2.51.246.190:995

37.211.86.156:443

42.201.228.106:995

50.29.166.232:995

102.185.58.126:443

81.133.234.36:2222

2.50.89.158:995

79.166.83.103:2222

173.245.152.231:443

2.86.41.23:2222

93.151.180.170:61202

24.179.13.119:443

24.152.219.253:995

105.198.236.99:443

24.205.42.241:443

176.58.132.212:2222

151.73.126.156:443

94.52.68.72:443

47.146.169.85:443

99.234.121.250:443

184.66.18.83:443

68.186.192.69:443

216.215.77.18:2222

199.116.241.147:443

68.174.15.223:443

180.233.150.134:443

134.0.196.46:995

85.60.132.8:2078

185.105.131.233:443

77.27.174.49:995

72.204.242.138:443

77.30.214.26:443

83.110.226.174:443

78.101.234.58:443

69.11.247.242:443

100.12.74.21:995

78.101.21.73:443

71.213.39.66:443

83.110.111.159:2078

72.183.129.56:443

185.246.9.69:995

90.91.5.98:2222

68.225.60.77:995

71.79.144.56:443

90.174.217.251:2222

79.117.140.145:443

83.110.150.186:443

5.15.225.109:443

47.138.204.19:443

Targets
Target

f2ec4d6a4cf9e3a9ffd51292ca722f8e4cb860e047bea963e5d76f94221e184a

MD5

a710a42b010bc82a53107a73f6e0d0ef

Filesize

251KB

Score
10 /10
SHA1

5f0f2c19bb57f164c49b02c6bb066b1e27779c6c

SHA256

f2ec4d6a4cf9e3a9ffd51292ca722f8e4cb860e047bea963e5d76f94221e184a

SHA512

6e7f5de74a2fed73cae068c3e8a196630d2257c5b213d6f3ba6887bffc0ee829c34fae2061d8bf89594ee5f8da88645bba24cf8301cc271757b68344882b18dc

Tags

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                    Privilege Escalation