General

  • Target

    7133c363f181e778160a9e20a464a774.dll

  • Size

    245KB

  • Sample

    201202-k362tbctfe

  • MD5

    7133c363f181e778160a9e20a464a774

  • SHA1

    0113ecb92bde56754332a836af435b0fa4a15035

  • SHA256

    dc77896335b79cbba7a95f8ce91d4d68600cb29a26cfa0de8033363b4d28508b

  • SHA512

    fd8f8afc609327e49c26471e0139f40bb22aea17ad848f6ed3a130647abc1b881bf3bc9142ee720b42f6e505271ddc51efb587a6e969023f307279265886c2b0

Malware Config

Extracted

Family

qakbot

Botnet

tr02

Campaign

1606748059

C2

197.45.110.165:995

86.99.134.235:2222

174.76.21.134:443

208.99.100.129:443

86.126.198.195:443

185.105.131.233:443

85.132.36.111:2222

105.198.236.101:443

2.49.219.254:22

217.165.2.92:995

67.6.54.180:443

5.193.115.251:2222

83.196.50.197:2222

89.3.198.238:443

94.141.3.242:443

73.239.229.107:995

217.165.15.245:2222

68.225.60.77:995

85.121.42.12:443

99.240.226.2:443

Targets

    • Target

      7133c363f181e778160a9e20a464a774.dll

    • Size

      245KB

    • MD5

      7133c363f181e778160a9e20a464a774

    • SHA1

      0113ecb92bde56754332a836af435b0fa4a15035

    • SHA256

      dc77896335b79cbba7a95f8ce91d4d68600cb29a26cfa0de8033363b4d28508b

    • SHA512

      fd8f8afc609327e49c26471e0139f40bb22aea17ad848f6ed3a130647abc1b881bf3bc9142ee720b42f6e505271ddc51efb587a6e969023f307279265886c2b0

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • ServiceHost packer

      Detects ServiceHost packer used for .NET malware

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Tasks