44459.6948533565.dat

General
Target

44459.6948533565.dat

Size

823KB

Sample

210920-vbqc4shcgl

Score
10 /10
MD5

5f8b22e659bfc7db9a7043a828da7675

SHA1

91a30a2b1b936ab508b37a713ae35358b3c24150

SHA256

153862cb79a2312f54a2307460872006138a649cdac6525df1d04c093c8b1454

SHA512

edcfbee0f7dbac6050a01703cd96d4bf130568c90a71290eccfb9aae6671274db95f60e1be8df7c51e1e58bc7ee22cc67ac63ffd56f0db8fd7a84d92f83cd3d9

Malware Config

Extracted

Family qakbot
Version 402.318
Botnet obama100
Campaign 1632151873
C2

45.46.53.140:2222

144.139.47.206:443

189.210.115.207:443

120.150.218.241:995

47.22.148.6:443

140.82.49.12:443

24.139.72.117:443

24.229.150.54:995

24.55.112.61:443

136.232.34.70:443

95.77.223.148:443

173.21.10.71:2222

76.25.142.196:443

96.37.113.36:993

71.74.12.34:443

73.151.236.31:443

67.165.206.193:993

109.12.111.14:443

68.204.7.158:443

105.198.236.99:443

75.188.35.168:443

216.201.162.158:443

196.218.227.241:995

185.250.148.74:2222

81.214.126.173:2222

68.186.192.69:443

72.252.201.69:443

92.59.35.196:2222

24.152.219.253:995

50.29.166.232:995

75.67.192.125:443

24.95.61.62:443

73.25.124.140:2222

27.223.92.142:995

64.121.114.87:443

151.205.102.42:443

72.240.200.181:2222

75.137.47.174:443

45.32.211.207:995

45.32.211.207:8443

149.28.98.196:2222

149.28.98.196:995

207.246.77.75:8443

45.63.107.192:995

149.28.99.97:443

45.77.117.108:2222

149.28.99.97:2222

45.32.211.207:2222

45.63.107.192:443

149.28.101.90:443

Targets
Target

44459.6948533565.dat

MD5

5f8b22e659bfc7db9a7043a828da7675

Filesize

823KB

Score
10 /10
SHA1

91a30a2b1b936ab508b37a713ae35358b3c24150

SHA256

153862cb79a2312f54a2307460872006138a649cdac6525df1d04c093c8b1454

SHA512

edcfbee0f7dbac6050a01703cd96d4bf130568c90a71290eccfb9aae6671274db95f60e1be8df7c51e1e58bc7ee22cc67ac63ffd56f0db8fd7a84d92f83cd3d9

Tags

Signatures

  • Qakbot/Qbot

    Description

    Qbot or Qakbot is a sophisticated worm with banking capabilities.

    Tags

  • Loads dropped DLL

Related Tasks

MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                      Privilege Escalation