944db2ee2b1958a2740d0b5c0057c46f.dll

General
Target

944db2ee2b1958a2740d0b5c0057c46f.dll

Size

823KB

Sample

210920-v116xaefe8

Score
10 /10
MD5

944db2ee2b1958a2740d0b5c0057c46f

SHA1

b0804ed04064aed6c9b283629b3416b5aeac84fb

SHA256

095c41270ae3a26ae9efb626be12ed920c44432f3c8cc8ed8ee67d67425c1251

SHA512

786273bb4be3439fdf0f79021c043b1a95afe85444c5330ead4d93b5ad6c3484f546017e564b50b64609725df7be9071cc1eee9b3817035a36229423995b1343

Malware Config

Extracted

Family qakbot
Version 402.318
Botnet obama100
Campaign 1632151873
C2

45.46.53.140:2222

144.139.47.206:443

189.210.115.207:443

120.150.218.241:995

47.22.148.6:443

140.82.49.12:443

24.139.72.117:443

24.229.150.54:995

24.55.112.61:443

136.232.34.70:443

95.77.223.148:443

173.21.10.71:2222

76.25.142.196:443

96.37.113.36:993

71.74.12.34:443

73.151.236.31:443

67.165.206.193:993

109.12.111.14:443

68.204.7.158:443

105.198.236.99:443

75.188.35.168:443

216.201.162.158:443

196.218.227.241:995

185.250.148.74:2222

81.214.126.173:2222

68.186.192.69:443

72.252.201.69:443

92.59.35.196:2222

24.152.219.253:995

50.29.166.232:995

75.67.192.125:443

24.95.61.62:443

73.25.124.140:2222

27.223.92.142:995

64.121.114.87:443

151.205.102.42:443

72.240.200.181:2222

75.137.47.174:443

45.32.211.207:995

45.32.211.207:8443

149.28.98.196:2222

149.28.98.196:995

207.246.77.75:8443

45.63.107.192:995

149.28.99.97:443

45.77.117.108:2222

149.28.99.97:2222

45.32.211.207:2222

45.63.107.192:443

149.28.101.90:443

Targets
Target

944db2ee2b1958a2740d0b5c0057c46f.dll

MD5

944db2ee2b1958a2740d0b5c0057c46f

Filesize

823KB

Score
10 /10
SHA1

b0804ed04064aed6c9b283629b3416b5aeac84fb

SHA256

095c41270ae3a26ae9efb626be12ed920c44432f3c8cc8ed8ee67d67425c1251

SHA512

786273bb4be3439fdf0f79021c043b1a95afe85444c5330ead4d93b5ad6c3484f546017e564b50b64609725df7be9071cc1eee9b3817035a36229423995b1343

Tags

Signatures

  • Qakbot/Qbot

    Description

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

    Tags

  • Loads dropped DLL

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                      Privilege Escalation