General

  • Target

    catalog-101939342.zip

  • Size

    84KB

  • Sample

    210423-vy9nmqtd3j

  • MD5

    d1cdaedff0591102301c7a3d98fd8418

  • SHA1

    4fdefc9652e9499e9bc9a3a22cb19d78eb58efbd

  • SHA256

    682e0c7768601e0d09bda4dca2eb1ba34a66d29ae0a8fc13d61edf9f49f8ff06

  • SHA512

    026f2bd28b14aa1db4bded6509deec1f74cd44d02227559fb06c1fe50d6532c6f6a577cfde996a2a562964e323cf58b5afd524fd1207dfdff79af12496b273e2

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://immobiliareneri.casa/drms/ind.html

xlm40.dropper

https://gidbasket.com/drms/ind.html

Extracted

Family

qakbot

Version

402.12

Botnet

tr

Campaign

1618935072

C2

140.82.49.12:443

190.85.91.154:443

96.37.113.36:993

71.41.184.10:3389

186.31.46.121:443

73.25.124.140:2222

109.12.111.14:443

24.229.150.54:995

45.32.211.207:443

45.77.117.108:443

45.77.117.108:8443

149.28.98.196:443

149.28.98.196:2222

144.202.38.185:443

144.202.38.185:995

45.32.211.207:995

207.246.116.237:995

149.28.99.97:995

45.63.107.192:2222

149.28.101.90:995

Targets

    • Target

      catalog-101939342.xlsm

    • Size

      109KB

    • MD5

      8d8d83f5520f55e3eb940be6a0eda409

    • SHA1

      7c588e68f68885483079061e5ad3472d3f8911eb

    • SHA256

      1e4f2b520eeeea8aa56cb3b743830b2e189f74d2b2787eb1b719d9120e583eb2

    • SHA512

      bb22280c153f8d1f34a9256f92a1fe7cf5caf29e734a61441b6660d4acf3366c0b77d169d98227b500996ce2e84c54519bf654ce027abe66d95096995d0c8321

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Loads dropped DLL

MITRE ATT&CK Enterprise v6

Tasks