dump2

General
Target

dump2

Size

232KB

Sample

210418-84p52qfyfs

Score
10 /10
MD5

b41c3d6737a3d7dda25818d8a089534c

SHA1

9216c78c12c4ecc2d5069bd0d8355ff688736b97

SHA256

2904cb2fc8d4fd434bb20b245cb86881215f29b4a044d806bf97614fc8e3737e

SHA512

b157f206a186d14d36a3a4a44fedb935c5b0a3bbd7abcbcad707b29bc59f99c821cbaa9df9c284451e26da04ffbd5e6268d0e23ecd3a3c04b10ef6fdaafc795f

Malware Config

Extracted

Family qakbot
Botnet notset
Campaign 1618398961
C2

47.196.192.184:443

216.201.162.158:443

136.232.34.70:443

71.41.184.10:3389

140.82.49.12:443

45.63.107.192:2222

45.63.107.192:443

149.28.98.196:443

45.32.211.207:443

144.202.38.185:443

45.77.115.208:2222

45.77.115.208:8443

207.246.116.237:995

45.77.117.108:443

149.28.99.97:443

149.28.99.97:995

149.28.98.196:995

45.32.211.207:995

45.32.211.207:2222

149.28.98.196:2222

45.32.211.207:8443

144.202.38.185:2222

144.202.38.185:995

149.28.101.90:995

149.28.101.90:8443

149.28.101.90:443

149.28.101.90:2222

45.77.115.208:443

45.77.115.208:995

207.246.77.75:995

207.246.77.75:443

207.246.77.75:2222

207.246.77.75:8443

207.246.116.237:443

207.246.116.237:8443

207.246.116.237:2222

45.77.117.108:995

45.77.117.108:2222

45.77.117.108:8443

195.6.1.154:2222

105.198.236.101:443

105.198.236.99:443

188.26.91.212:443

81.97.154.100:443

78.63.226.32:443

45.63.107.192:995

149.28.99.97:2222

115.133.243.6:443

27.223.92.142:995

76.25.142.196:443

Targets
Target

dump2

MD5

b41c3d6737a3d7dda25818d8a089534c

Filesize

232KB

Score
10 /10
SHA1

9216c78c12c4ecc2d5069bd0d8355ff688736b97

SHA256

2904cb2fc8d4fd434bb20b245cb86881215f29b4a044d806bf97614fc8e3737e

SHA512

b157f206a186d14d36a3a4a44fedb935c5b0a3bbd7abcbcad707b29bc59f99c821cbaa9df9c284451e26da04ffbd5e6268d0e23ecd3a3c04b10ef6fdaafc795f

Tags

Signatures

  • Qakbot/Qbot

    Description

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

    Tags

  • Loads dropped DLL

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                      Privilege Escalation