44459.8061394676.dat

General
Target

44459.8061394676.dat

Size

823KB

Sample

210920-vbamnahcgk

Score
10 /10
MD5

a372400cbff205def639e4db62ef17b4

SHA1

445447a8cd34df42d7fd786a164389cf8e5f82db

SHA256

63deda6fe8af221a650f6ba6a2ee6c7fec17f10bc5e063c9b0aaee4981a01150

SHA512

763807749271cf66fa935b4da272ede62543971e124680381af5f22dd20d48d7f297dfcfb441ad3e56b96902129428d925b89e37ebc745b62d641fe7802b5457

Malware Config

Extracted

Family qakbot
Version 402.318
Botnet obama100
Campaign 1632151873
C2

45.46.53.140:2222

144.139.47.206:443

189.210.115.207:443

120.150.218.241:995

47.22.148.6:443

140.82.49.12:443

24.139.72.117:443

24.229.150.54:995

24.55.112.61:443

136.232.34.70:443

95.77.223.148:443

173.21.10.71:2222

76.25.142.196:443

96.37.113.36:993

71.74.12.34:443

73.151.236.31:443

67.165.206.193:993

109.12.111.14:443

68.204.7.158:443

105.198.236.99:443

75.188.35.168:443

216.201.162.158:443

196.218.227.241:995

185.250.148.74:2222

81.214.126.173:2222

68.186.192.69:443

72.252.201.69:443

92.59.35.196:2222

24.152.219.253:995

50.29.166.232:995

75.67.192.125:443

24.95.61.62:443

73.25.124.140:2222

27.223.92.142:995

64.121.114.87:443

151.205.102.42:443

72.240.200.181:2222

75.137.47.174:443

45.32.211.207:995

45.32.211.207:8443

149.28.98.196:2222

149.28.98.196:995

207.246.77.75:8443

45.63.107.192:995

149.28.99.97:443

45.77.117.108:2222

149.28.99.97:2222

45.32.211.207:2222

45.63.107.192:443

149.28.101.90:443

Targets
Target

44459.8061394676.dat

MD5

a372400cbff205def639e4db62ef17b4

Filesize

823KB

Score
10 /10
SHA1

445447a8cd34df42d7fd786a164389cf8e5f82db

SHA256

63deda6fe8af221a650f6ba6a2ee6c7fec17f10bc5e063c9b0aaee4981a01150

SHA512

763807749271cf66fa935b4da272ede62543971e124680381af5f22dd20d48d7f297dfcfb441ad3e56b96902129428d925b89e37ebc745b62d641fe7802b5457

Tags

Signatures

  • Qakbot/Qbot

    Description

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

    Tags

  • Loads dropped DLL

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                      Privilege Escalation