triage2

General
Target

triage2

Size

217KB

Sample

210418-rsjfahtswn

Score
10 /10
MD5

9a44b520e760d8b33f4e949798c66d91

SHA1

a8ce027ac22e6a922149296de6e3ebaca24c7285

SHA256

0d18ffaf66e43bb43939c0970a2ae2927470485036e068f7886dabaab217256d

SHA512

f06a953e88012f843958d9cb1678a8fcd2f6aea636b298dffc3e2d2c1bbc2338d1c0108bdf9a8bcbe77a09a37a48f4290009e3be7bdd31b9ced45d33b5b7f96b

Malware Config

Extracted

Family qakbot
Botnet notset
Campaign 1618398961
C2

47.196.192.184:443

216.201.162.158:443

136.232.34.70:443

71.41.184.10:3389

140.82.49.12:443

45.63.107.192:2222

45.63.107.192:443

149.28.98.196:443

45.32.211.207:443

144.202.38.185:443

45.77.115.208:2222

45.77.115.208:8443

207.246.116.237:995

45.77.117.108:443

149.28.99.97:443

149.28.99.97:995

149.28.98.196:995

45.32.211.207:995

45.32.211.207:2222

149.28.98.196:2222

45.32.211.207:8443

144.202.38.185:2222

144.202.38.185:995

149.28.101.90:995

149.28.101.90:8443

149.28.101.90:443

149.28.101.90:2222

45.77.115.208:443

45.77.115.208:995

207.246.77.75:995

207.246.77.75:443

207.246.77.75:2222

207.246.77.75:8443

207.246.116.237:443

207.246.116.237:8443

207.246.116.237:2222

45.77.117.108:995

45.77.117.108:2222

45.77.117.108:8443

195.6.1.154:2222

105.198.236.101:443

105.198.236.99:443

188.26.91.212:443

81.97.154.100:443

78.63.226.32:443

45.63.107.192:995

149.28.99.97:2222

115.133.243.6:443

27.223.92.142:995

76.25.142.196:443

Targets
Target

triage2

MD5

9a44b520e760d8b33f4e949798c66d91

Filesize

217KB

Score
10 /10
SHA1

a8ce027ac22e6a922149296de6e3ebaca24c7285

SHA256

0d18ffaf66e43bb43939c0970a2ae2927470485036e068f7886dabaab217256d

SHA512

f06a953e88012f843958d9cb1678a8fcd2f6aea636b298dffc3e2d2c1bbc2338d1c0108bdf9a8bcbe77a09a37a48f4290009e3be7bdd31b9ced45d33b5b7f96b

Tags

Signatures

  • Qakbot/Qbot

    Description

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

    Tags

  • Loads dropped DLL

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                      Privilege Escalation