General

  • Target

    78bccdfce650d1b0c3023ed1cf7174625e88af831865a926c927a320c1177e10

  • Size

    1.1MB

  • Sample

    211022-l9ngqsbeb5

  • MD5

    cab72ace08bfd9114939c22f04a5524d

  • SHA1

    4cbc3ac583a001e2a717acd4db8fce69257f57c2

  • SHA256

    78bccdfce650d1b0c3023ed1cf7174625e88af831865a926c927a320c1177e10

  • SHA512

    cdf0c48be3ac5a5f8d15b6183abc3b6bfbc27c0dbf022bf3db4f9d85f33dc6ce3e71b990c75199d79bc4ee64dd782ce9f9ae73c6317e2f87ff789d33efea8438

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://194.36.191.30/44491.4240451389.dat

xlm40.dropper

http://23.106.122.40/44491.4240451389.dat

xlm40.dropper

http://94.140.112.52/44491.4240451389.dat

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

http://194.36.191.30/44490.5054936343.dat

xlm40.dropper

http://23.106.122.40/44490.5054936343.dat

xlm40.dropper

http://94.140.112.52/44490.5054936343.dat

Extracted

Family

qakbot

Version

402.363

Botnet

biden53

Campaign

1634717752

C2

103.142.10.177:443

24.152.219.253:995

181.118.183.94:443

129.208.147.188:995

24.119.214.7:443

38.70.253.226:2222

103.143.8.71:443

77.57.204.78:443

65.100.174.110:995

220.255.25.28:2222

91.178.126.51:995

37.210.155.239:995

81.241.252.59:2078

93.48.58.123:2222

65.100.174.110:443

76.25.142.196:443

24.231.209.2:2222

140.82.49.12:443

146.66.238.74:443

39.49.4.147:995

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Targets

    • Target

      Account-1579644703.xls

    • Size

      534KB

    • MD5

      65a32f108d3c8a6cc8d7813b9892a952

    • SHA1

      58f1ec7f794a717acfef21f2e1718a80e76d41c5

    • SHA256

      6410cdf429baab84d583828623814316317029059eb46d8eab9a755bf234c612

    • SHA512

      5a9e430794bee2f27dd376f98617a718702600d4ef1a069c16da895c0848c2d3b5372ebf9a7fe5dec5a32427503433bef52bd42349a0b65b995175d80054b84a

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Target

      Original.dll

    • Size

      1.2MB

    • MD5

      b010fb1ea0c950e9b14a331b0da5aac8

    • SHA1

      243989dc10c90b77ed107cbc066d8cc162fe7ab4

    • SHA256

      641d48fdf79d0513748ed7044275f35ed5fa27177e5427a38d143d1c3272c40b

    • SHA512

      6b8376162d9a7c88903280895e4efa133b3bb0a930021e52a591cab9e20c15097056a2b5a260ba9f678bf8409f1deabd687f85852dcf337e46606e4657ccf3f8

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Defense Evasion

Modify Registry

2
T1112

Disabling Security Tools

1
T1089

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks