44267.7574392361[3].dat

General
Target

44267.7574392361[3].dat

Size

720KB

Sample

210312-ma17sg76qx

Score
10 /10
MD5

094ff6f5b463137bbc5633ba8f86c12c

SHA1

6f94cd0c6a8705b2549bd1944fbc1f2d9e191035

SHA256

0a682e164b078c64ecb724cd359cce68905ef56b8b65dcc4d5e8e54dbbfd585c

SHA512

8c633b9232f1dd5e23801cf53e9799eea0266a161d58d38881a96adcdd3c741e3750eae6ec83b94ab893ae4becd7d996aed4b8f951b3e4027f00c98d284d0584

Malware Config

Extracted

Family qakbot
Botnet obama12
Campaign 1615566531
C2

81.214.126.173:2222

75.118.1.141:443

98.252.118.134:443

81.97.154.100:443

186.31.77.42:443

71.117.132.169:443

24.139.72.117:443

106.51.52.111:443

47.196.192.184:443

24.95.61.62:443

47.22.148.6:443

195.12.154.8:443

71.163.223.159:443

71.41.184.10:3389

193.248.221.184:2222

83.110.108.38:2222

92.59.35.196:2222

73.25.124.140:2222

75.67.192.125:443

83.196.56.65:2222

96.21.251.127:2222

176.205.222.30:2078

50.244.112.106:443

197.45.110.165:995

97.69.160.4:2222

216.201.162.158:443

172.78.30.215:443

105.198.236.99:443

77.27.204.204:995

24.117.107.120:443

75.136.40.155:443

140.82.49.12:443

86.175.79.249:443

189.210.115.207:443

105.198.236.101:443

77.211.30.202:995

184.189.122.72:443

24.50.118.93:443

108.29.32.251:443

71.197.126.250:443

151.205.102.42:443

70.168.130.172:995

68.186.192.69:443

71.199.192.62:443

95.77.223.148:443

71.187.170.235:443

24.43.22.218:993

90.65.236.181:2222

75.137.47.174:443

72.240.200.181:2222

Targets
Target

44267.7574392361[3].dat

MD5

094ff6f5b463137bbc5633ba8f86c12c

Filesize

720KB

Score
10 /10
SHA1

6f94cd0c6a8705b2549bd1944fbc1f2d9e191035

SHA256

0a682e164b078c64ecb724cd359cce68905ef56b8b65dcc4d5e8e54dbbfd585c

SHA512

8c633b9232f1dd5e23801cf53e9799eea0266a161d58d38881a96adcdd3c741e3750eae6ec83b94ab893ae4becd7d996aed4b8f951b3e4027f00c98d284d0584

Tags

Signatures

  • Qakbot/Qbot

    Description

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

    Tags

  • Loads dropped DLL

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                      Privilege Escalation