General
-
Target
Compensation-1093400938.xls
-
Size
233KB
-
Sample
210930-qdayzshgd4
-
MD5
9952a72e006111e4a9613c5bdbd7982f
-
SHA1
a642c5d809d3b2cad15f1ca0fb56a8bce54ca086
-
SHA256
62d8610935ea360961511fa6361d82248dfdaae459bb6fab4bbc2f924627172c
-
SHA512
febd4bc0154ad140e9dcb9f5ba0464b9253b5e9df8a2c652252dba63f226d09c68f4b19d587476805591c1cb7f7041dc56d78908e03154a81ec2039b8016d6c2
Behavioral task
behavioral1
Sample
Compensation-1093400938.xls
Resource
win7-en-20210920
Malware Config
Extracted
https://safalerp.com/J1wlINw7HtJ/siera.xml
https://godschildrenaf.org/qxwbRMzrqoWK/siera.xml
https://callgirlsandescortkenya.site/hllzvTuU/siera.xml
Extracted
qakbot
402.363
tr
1632817399
105.198.236.99:443
140.82.49.12:443
37.210.152.224:995
89.101.97.139:443
81.241.252.59:2078
27.223.92.142:995
81.250.153.227:2222
73.151.236.31:443
47.22.148.6:443
122.11.220.212:2222
120.151.47.189:443
199.27.127.129:443
216.201.162.158:443
136.232.34.70:443
76.25.142.196:443
181.118.183.94:443
120.150.218.241:995
185.250.148.74:443
95.77.223.148:443
75.66.88.33:443
45.46.53.140:2222
173.25.166.81:443
103.148.120.144:443
173.21.10.71:2222
186.18.205.199:995
71.74.12.34:443
67.165.206.193:993
47.40.196.233:2222
68.204.7.158:443
24.229.150.54:995
109.12.111.14:443
177.130.82.197:2222
72.252.201.69:443
24.55.112.61:443
24.139.72.117:443
187.156.138.172:443
71.80.168.245:443
105.157.55.133:995
82.77.137.101:995
173.234.155.233:443
75.188.35.168:443
5.238.149.235:61202
73.77.87.137:443
182.176.112.182:443
96.37.113.36:993
162.244.227.34:443
92.59.35.196:2222
196.218.227.241:995
68.207.102.78:443
2.188.27.77:443
189.210.115.207:443
181.163.96.53:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
Targets
-
-
Target
Compensation-1093400938.xls
-
Size
233KB
-
MD5
9952a72e006111e4a9613c5bdbd7982f
-
SHA1
a642c5d809d3b2cad15f1ca0fb56a8bce54ca086
-
SHA256
62d8610935ea360961511fa6361d82248dfdaae459bb6fab4bbc2f924627172c
-
SHA512
febd4bc0154ad140e9dcb9f5ba0464b9253b5e9df8a2c652252dba63f226d09c68f4b19d587476805591c1cb7f7041dc56d78908e03154a81ec2039b8016d6c2
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Loads dropped DLL
-