Analysis
-
max time kernel
9s -
max time network
9s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
26-02-2021 14:57
Static task
static1
Behavioral task
behavioral1
Sample
cbe2f650ed2c319130bc060a600c4b9d17d255d319b24fac10da293c673b3572.dll
Resource
win7v20201028
General
-
Target
cbe2f650ed2c319130bc060a600c4b9d17d255d319b24fac10da293c673b3572.dll
-
Size
801KB
-
MD5
67bdb286d03b8b4760e792b29c5fd6a1
-
SHA1
c722600b1355bbcfa06bd727be9ddc93c2664d8b
-
SHA256
cbe2f650ed2c319130bc060a600c4b9d17d255d319b24fac10da293c673b3572
-
SHA512
8a034c67c7d9be3b51930440af939f9b014548d2599535930df18fc81e1bb114cbdadcfc86cf68e6d4ed8818633ced871fe252d0a242b5387d082b185008b4ed
Malware Config
Extracted
qakbot
biden02
1614254614
71.163.223.159:443
83.110.9.71:2222
87.202.87.210:2222
47.22.148.6:443
78.180.179.136:443
67.8.103.21:443
140.82.49.12:443
213.60.147.140:443
187.250.39.162:443
86.236.77.68:2222
108.46.145.30:443
172.87.157.235:3389
79.115.174.55:443
217.133.54.140:32100
83.110.109.106:2222
78.63.226.32:443
83.196.56.65:2222
59.90.246.200:443
89.137.211.239:995
105.96.8.96:443
125.209.114.182:995
106.51.85.162:443
73.153.211.227:443
105.198.236.99:443
45.63.107.192:2222
149.28.101.90:995
149.28.99.97:995
45.63.107.192:995
207.246.77.75:443
207.246.77.75:2222
149.28.99.97:443
149.28.99.97:2222
45.32.211.207:443
45.32.211.207:995
45.32.211.207:8443
45.32.211.207:2222
45.63.107.192:443
149.28.98.196:2222
149.28.98.196:995
149.28.98.196:443
144.202.38.185:443
144.202.38.185:2222
144.202.38.185:995
149.28.101.90:443
149.28.101.90:8443
149.28.101.90:2222
45.77.115.208:8443
45.77.115.208:443
45.77.115.208:995
45.77.115.208:2222
207.246.77.75:995
207.246.77.75:8443
207.246.116.237:443
207.246.116.237:995
207.246.116.237:8443
207.246.116.237:2222
45.77.117.108:443
45.77.117.108:8443
45.77.117.108:995
45.77.117.108:2222
80.227.5.69:443
219.76.148.200:443
197.51.82.72:443
193.248.221.184:2222
84.72.35.226:443
2.232.253.79:995
24.43.22.218:993
81.97.154.100:443
90.65.236.181:2222
95.77.223.148:443
83.110.103.152:443
119.153.43.235:3389
89.3.198.238:443
98.192.185.86:443
115.133.243.6:443
2.7.116.188:2222
188.26.91.212:443
113.22.175.141:443
176.181.247.197:443
173.21.10.71:2222
45.46.53.140:2222
50.29.166.232:995
96.37.113.36:993
202.188.138.162:443
76.25.142.196:443
65.27.228.247:443
122.148.156.131:995
71.74.12.34:443
142.117.191.18:2222
202.184.20.119:443
98.252.118.134:443
189.211.177.183:995
189.222.59.177:443
74.68.144.202:443
189.146.183.105:443
71.197.126.250:443
32.210.98.6:443
187.250.118.233:995
92.59.35.196:2222
195.12.154.8:443
67.6.12.4:443
86.160.137.132:443
96.57.188.174:2222
38.92.225.121:443
197.45.110.165:995
181.48.190.78:443
173.184.119.153:995
24.229.150.54:995
50.244.112.106:443
144.139.166.18:443
81.150.181.168:2222
68.186.192.69:443
74.222.204.82:995
71.117.132.169:443
98.121.187.78:443
75.136.26.147:443
85.52.72.32:2222
109.12.111.14:443
80.11.173.82:8443
209.210.187.52:443
209.210.187.52:995
108.160.123.244:443
24.152.219.253:995
196.151.252.84:443
172.115.177.204:2222
24.139.72.117:443
24.55.112.61:443
105.198.236.101:443
186.28.55.211:443
97.69.160.4:2222
47.187.108.172:443
216.201.162.158:443
71.199.192.62:443
71.88.193.17:443
71.187.170.235:443
77.211.30.202:995
77.27.204.204:995
189.210.115.207:443
125.239.152.76:995
82.12.157.95:995
98.173.34.213:995
151.205.102.42:443
72.240.200.181:2222
160.3.187.114:443
73.25.124.140:2222
24.50.118.93:443
82.127.125.209:990
79.129.121.81:995
189.223.234.23:995
108.31.15.10:995
Signatures
-
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1040 wrote to memory of 1740 1040 rundll32.exe rundll32.exe PID 1040 wrote to memory of 1740 1040 rundll32.exe rundll32.exe PID 1040 wrote to memory of 1740 1040 rundll32.exe rundll32.exe PID 1040 wrote to memory of 1740 1040 rundll32.exe rundll32.exe PID 1040 wrote to memory of 1740 1040 rundll32.exe rundll32.exe PID 1040 wrote to memory of 1740 1040 rundll32.exe rundll32.exe PID 1040 wrote to memory of 1740 1040 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cbe2f650ed2c319130bc060a600c4b9d17d255d319b24fac10da293c673b3572.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\cbe2f650ed2c319130bc060a600c4b9d17d255d319b24fac10da293c673b3572.dll,#12⤵PID:1740
-