87b3f4a29899b54763d5a73a7e0483ea.dll

General
Target

87b3f4a29899b54763d5a73a7e0483ea.dll

Size

485KB

Sample

210504-98bq96w7jx

Score
10 /10
MD5

87b3f4a29899b54763d5a73a7e0483ea

SHA1

75dfb32188c588f1e24abfc8af53f138740aa7b1

SHA256

4920b2f647aa16bd4e806c88a1af679fbfec0c6790372ceb878efa787a5e55bb

SHA512

0a8a9c5b053c886068fad0abead50bfeee7b7900fe0b5dfbc2ea284f626cf959b568f4a0b1cea01868367a929166811a8a2bfc6b5422c4a8a96b597c1a0b709e

Malware Config

Extracted

Family qakbot
Version 402.12
Botnet tr
Campaign 1618935072
C2

140.82.49.12:443

190.85.91.154:443

96.37.113.36:993

71.41.184.10:3389

186.31.46.121:443

73.25.124.140:2222

109.12.111.14:443

24.229.150.54:995

45.32.211.207:443

45.77.117.108:443

45.77.117.108:8443

149.28.98.196:443

149.28.98.196:2222

144.202.38.185:443

144.202.38.185:995

45.32.211.207:995

207.246.116.237:995

149.28.99.97:995

45.63.107.192:2222

149.28.101.90:995

45.77.115.208:2222

45.32.211.207:8443

45.32.211.207:2222

45.77.115.208:443

207.246.116.237:443

45.77.117.108:2222

149.28.98.196:995

45.63.107.192:443

149.28.101.90:8443

24.152.219.253:995

149.28.101.90:443

149.28.101.90:2222

45.77.115.208:995

45.77.115.208:8443

207.246.77.75:8443

207.246.77.75:2222

207.246.116.237:2222

45.77.117.108:995

149.28.99.97:443

144.202.38.185:2222

207.246.77.75:995

207.246.77.75:443

207.246.116.237:8443

24.55.112.61:443

47.22.148.6:443

216.201.162.158:443

197.45.110.165:995

24.117.107.120:443

71.163.222.243:443

189.210.115.207:443

Targets
Target

87b3f4a29899b54763d5a73a7e0483ea.dll

MD5

87b3f4a29899b54763d5a73a7e0483ea

Filesize

485KB

Score
10 /10
SHA1

75dfb32188c588f1e24abfc8af53f138740aa7b1

SHA256

4920b2f647aa16bd4e806c88a1af679fbfec0c6790372ceb878efa787a5e55bb

SHA512

0a8a9c5b053c886068fad0abead50bfeee7b7900fe0b5dfbc2ea284f626cf959b568f4a0b1cea01868367a929166811a8a2bfc6b5422c4a8a96b597c1a0b709e

Tags

Signatures

  • Qakbot/Qbot

    Description

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

    Tags

  • Loads dropped DLL

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                      Privilege Escalation
                        Tasks