dump

General
Target

dump

Size

232KB

Sample

210418-16a81x6sw2

Score
10 /10
MD5

78ebf1acdac12e5855b0a305149a77c7

SHA1

08209879a52b5a08b945577337097c76f776f8cf

SHA256

2032c13190d9347fc677e840f295918ea8f0f8bb17d29a083afe19c1c09d4fd4

SHA512

0922573efa8367247a550ae48fb6e11990bd39c024eb356d60714ff46ebd4cfa84a39acbd53583d625c84f94321d2144ebf2514e5a3c96d2fa14e0add50d30e2

Malware Config

Extracted

Family qakbot
Botnet notset
Campaign 1618398961
C2

47.196.192.184:443

216.201.162.158:443

136.232.34.70:443

71.41.184.10:3389

140.82.49.12:443

45.63.107.192:2222

45.63.107.192:443

149.28.98.196:443

45.32.211.207:443

144.202.38.185:443

45.77.115.208:2222

45.77.115.208:8443

207.246.116.237:995

45.77.117.108:443

149.28.99.97:443

149.28.99.97:995

149.28.98.196:995

45.32.211.207:995

45.32.211.207:2222

149.28.98.196:2222

45.32.211.207:8443

144.202.38.185:2222

144.202.38.185:995

149.28.101.90:995

149.28.101.90:8443

149.28.101.90:443

149.28.101.90:2222

45.77.115.208:443

45.77.115.208:995

207.246.77.75:995

207.246.77.75:443

207.246.77.75:2222

207.246.77.75:8443

207.246.116.237:443

207.246.116.237:8443

207.246.116.237:2222

45.77.117.108:995

45.77.117.108:2222

45.77.117.108:8443

195.6.1.154:2222

105.198.236.101:443

105.198.236.99:443

188.26.91.212:443

81.97.154.100:443

78.63.226.32:443

45.63.107.192:995

149.28.99.97:2222

115.133.243.6:443

27.223.92.142:995

76.25.142.196:443

Targets
Target

dump

MD5

78ebf1acdac12e5855b0a305149a77c7

Filesize

232KB

Score
10 /10
SHA1

08209879a52b5a08b945577337097c76f776f8cf

SHA256

2032c13190d9347fc677e840f295918ea8f0f8bb17d29a083afe19c1c09d4fd4

SHA512

0922573efa8367247a550ae48fb6e11990bd39c024eb356d60714ff46ebd4cfa84a39acbd53583d625c84f94321d2144ebf2514e5a3c96d2fa14e0add50d30e2

Tags

Signatures

  • Qakbot/Qbot

    Description

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

    Tags

  • Loads dropped DLL

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                      Privilege Escalation