61101e59c831732d3620689c3cf6ff3a0c302028866e109481e2fe31f5d6337e

General
Target

61101e59c831732d3620689c3cf6ff3a0c302028866e109481e2fe31f5d6337e

Size

2MB

Sample

210706-x3sw624lj2

Score
10 /10
MD5

1f498b538c41c22731cde9f41cf92b32

SHA1

10c78eba96fd5be058bd179f464e88e1478e6d44

SHA256

61101e59c831732d3620689c3cf6ff3a0c302028866e109481e2fe31f5d6337e

SHA512

2e21d3fdbdc95fb98f90d4f0c9116e3924e70a3a78f32dbd920c60e857feba68ec4d62c17e9b16cdd8cbb245a462c95523c01de270031c504d31f9cd5c91228d

Malware Config

Extracted

Family qakbot
Version 324.142
Botnet spx144
Campaign 1592561858
C2

50.247.230.33:995

75.81.25.223:443

24.71.28.247:443

47.28.135.155:443

122.147.204.4:995

189.140.137.184:990

41.228.59.231:443

39.36.254.179:995

178.221.64.104:995

75.110.250.89:443

185.246.9.69:995

94.52.160.116:443

65.24.76.114:443

86.153.98.66:2222

117.218.208.239:443

98.118.156.172:443

72.179.242.236:0

108.46.145.30:443

68.200.23.189:443

84.232.238.30:443

148.75.231.53:443

173.49.122.160:995

71.163.222.64:443

86.175.7.7:2222

172.242.156.50:995

78.96.192.26:443

173.245.152.231:443

98.32.60.217:443

173.175.29.210:443

5.13.84.244:995

185.145.113.249:443

188.214.209.215:443

46.102.79.11:443

67.246.16.250:995

207.255.161.8:32100

69.11.247.242:443

69.92.54.95:995

200.113.201.83:995

82.81.172.21:443

74.134.46.7:443

216.163.4.132:443

200.75.136.78:443

188.241.235.29:2222

73.217.4.42:443

96.244.45.155:443

35.142.12.163:2222

80.195.103.146:2222

49.207.105.25:443

72.142.106.198:465

66.26.160.37:443

Targets
Target

61101e59c831732d3620689c3cf6ff3a0c302028866e109481e2fe31f5d6337e

MD5

1f498b538c41c22731cde9f41cf92b32

Filesize

2MB

Score
10 /10
SHA1

10c78eba96fd5be058bd179f464e88e1478e6d44

SHA256

61101e59c831732d3620689c3cf6ff3a0c302028866e109481e2fe31f5d6337e

SHA512

2e21d3fdbdc95fb98f90d4f0c9116e3924e70a3a78f32dbd920c60e857feba68ec4d62c17e9b16cdd8cbb245a462c95523c01de270031c504d31f9cd5c91228d

Tags

Signatures

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                      Privilege Escalation