a23ef053cccf6a35fda9adc5f1702ba99a7be695107d3ba5d1ea8c9c258299e4.bin.sample

General
Target

a23ef053cccf6a35fda9adc5f1702ba99a7be695107d3ba5d1ea8c9c258299e4.bin.sample

Size

1MB

Sample

210805-jh18cvkn12

Score
10 /10
MD5

136b9c85525ba66276b8c9f6b7014b0b

SHA1

0cf5ba13d14c28c60586c7f4b9679925fa4d4172

SHA256

a23ef053cccf6a35fda9adc5f1702ba99a7be695107d3ba5d1ea8c9c258299e4

SHA512

0c02b116029a7d4f4c44988dc6220ed4050c94cab6e57f4aeb29d8edd0b8b59e74c89d6bd62e6e828826f44ebfb478280051ca289ea712c52d5fd113541e2590

Malware Config

Extracted

Family qakbot
Version 324.142
Botnet spx133
Campaign 1591267427
C2

49.144.84.21:443

189.159.133.162:995

173.245.152.231:443

77.237.181.212:995

207.255.161.8:2078

76.187.8.160:443

207.255.161.8:2087

98.219.77.197:443

66.222.88.126:995

207.255.161.8:32102

108.58.9.238:995

47.152.210.233:443

1.40.42.4:443

188.27.71.163:443

82.127.193.151:2222

104.50.141.139:995

67.83.54.76:2222

86.126.97.183:2222

73.94.229.115:443

47.35.182.97:443

72.29.181.77:2078

98.114.185.3:443

24.226.137.154:443

5.12.114.96:443

78.97.145.242:443

64.121.114.87:443

62.121.123.57:443

151.73.126.205:443

69.40.17.142:443

197.165.178.49:443

80.240.26.178:443

79.115.128.221:443

49.191.4.245:443

71.187.170.235:443

108.51.73.186:443

134.0.196.46:995

75.81.25.223:443

96.56.237.174:993

72.240.245.253:443

67.131.59.17:443

216.163.4.91:443

72.204.242.138:443

72.190.101.70:443

47.201.1.210:443

24.43.22.220:995

76.170.77.99:443

71.163.225.75:443

69.92.54.95:995

108.31.92.113:443

185.246.9.69:995

Targets
Target

a23ef053cccf6a35fda9adc5f1702ba99a7be695107d3ba5d1ea8c9c258299e4.bin.sample

MD5

136b9c85525ba66276b8c9f6b7014b0b

Filesize

1MB

Score
10 /10
SHA1

0cf5ba13d14c28c60586c7f4b9679925fa4d4172

SHA256

a23ef053cccf6a35fda9adc5f1702ba99a7be695107d3ba5d1ea8c9c258299e4

SHA512

0c02b116029a7d4f4c44988dc6220ed4050c94cab6e57f4aeb29d8edd0b8b59e74c89d6bd62e6e828826f44ebfb478280051ca289ea712c52d5fd113541e2590

Tags

Signatures

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Execution
            Exfiltration
              Impact
                Initial Access
                  Lateral Movement
                    Persistence
                      Privilege Escalation