Overview
overview
10Static
static
quakbotsam...c1.dll
windows7_x64
10quakbotsam...c1.dll
windows10-2004_x64
10quakbotsam...e1.dll
windows7_x64
10quakbotsam...e1.dll
windows10-2004_x64
10quakbotsam...60.dll
windows7_x64
10quakbotsam...60.dll
windows10-2004_x64
10quakbotsam...1b.dll
windows7_x64
10quakbotsam...1b.dll
windows10-2004_x64
10quakbotsam...a1.dll
windows7_x64
10quakbotsam...a1.dll
windows10-2004_x64
10Resubmissions
23-03-2022 16:54
220323-ve19sahca5 1023-03-2022 16:45
220323-t9cn8sdedq 1023-03-2022 08:56
220323-kwef8sbae3 10Analysis
-
max time kernel
4294178s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
23-03-2022 16:45
Static task
static1
Behavioral task
behavioral1
Sample
quakbotsamples/29148f550d02cf98d89efb53f7137da28e91df43790f4fc052a0f405f99edcc1.dll
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
quakbotsamples/29148f550d02cf98d89efb53f7137da28e91df43790f4fc052a0f405f99edcc1.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
quakbotsamples/62b038f2dc2ab995d036930a2eaa5f2dc67fb0ab884459d3fa6df653eec307e1.dll
Resource
win7-20220310-en
Behavioral task
behavioral4
Sample
quakbotsamples/62b038f2dc2ab995d036930a2eaa5f2dc67fb0ab884459d3fa6df653eec307e1.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
quakbotsamples/a16db0d2025dff39a4a0de4071ce0e73c6810ab497453ad67c16ba0980385f60.dll
Resource
win7-20220311-en
Behavioral task
behavioral6
Sample
quakbotsamples/a16db0d2025dff39a4a0de4071ce0e73c6810ab497453ad67c16ba0980385f60.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral7
Sample
quakbotsamples/a5bc6aad1c3205857cf8d29058f8a5283bdc743b9965b5b5d2e69df9a9b6bb1b.dll
Resource
win7-20220311-en
Behavioral task
behavioral8
Sample
quakbotsamples/a5bc6aad1c3205857cf8d29058f8a5283bdc743b9965b5b5d2e69df9a9b6bb1b.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral9
Sample
quakbotsamples/c59d033fa3a58112f7520113699c74552c4d12bb10783fa880359ec94affe2a1.dll
Resource
win7-20220311-en
General
-
Target
quakbotsamples/29148f550d02cf98d89efb53f7137da28e91df43790f4fc052a0f405f99edcc1.dll
-
Size
260KB
-
MD5
01b9cb4752f2a33d563fd09089d76571
-
SHA1
8aa2a65b78c1da2bac332069f53b6283c46f9fc6
-
SHA256
29148f550d02cf98d89efb53f7137da28e91df43790f4fc052a0f405f99edcc1
-
SHA512
2764312e1608927ead6467c885ab5155d6fac3ec69ab856991a50f8af0f61085901c43fd4ce2d7f071623bb9e0bd6d478103d9ad87ae6219334fb1102ee297aa
Malware Config
Extracted
qakbot
401.51
abc105
1606839097
90.101.117.122:2222
78.97.207.104:443
189.222.242.165:995
95.76.27.6:443
2.50.56.81:443
96.225.88.23:443
47.21.192.182:2222
189.222.242.165:443
197.86.204.38:443
84.117.176.32:443
93.146.133.102:2222
71.38.13.243:443
96.21.251.127:2222
184.98.97.227:995
58.179.21.147:995
187.213.136.249:995
65.30.213.13:6882
80.195.103.146:2222
106.51.85.162:443
187.227.87.235:995
94.59.236.155:995
94.53.16.196:443
89.137.211.239:443
190.162.118.43:0
45.32.162.253:443
45.32.165.134:443
140.82.27.132:443
173.245.152.231:443
92.137.138.52:2222
92.154.83.96:1194
190.220.8.10:993
151.75.13.83:443
77.132.113.187:2222
186.147.222.63:443
2.51.246.190:995
69.47.239.10:443
68.116.193.239:443
96.27.47.70:2222
68.134.181.98:443
197.45.110.165:995
86.99.134.235:2222
71.83.16.211:443
78.96.199.79:443
189.210.115.207:443
24.179.13.119:443
74.102.76.128:443
84.126.11.130:443
176.181.247.197:443
173.169.189.169:443
187.149.126.53:443
68.131.19.52:443
189.140.45.48:995
86.98.34.84:995
208.82.44.203:443
200.30.223.162:443
184.21.136.237:995
65.131.47.74:995
71.197.126.250:443
72.252.201.69:443
82.12.157.95:995
187.153.119.36:443
24.71.28.247:443
72.36.11.22:443
181.208.249.141:443
200.110.188.218:443
118.70.55.146:443
39.32.55.12:995
62.38.114.12:2222
104.37.20.207:995
172.87.157.235:443
185.163.221.77:2222
197.161.154.132:443
83.110.150.100:443
151.60.163.18:443
73.51.245.231:995
67.8.103.21:443
37.210.131.246:443
151.27.89.199:443
79.129.216.215:2222
75.136.26.147:443
94.69.112.148:2222
41.97.183.51:443
5.13.70.10:443
85.132.36.111:2222
67.237.68.126:2222
96.247.176.125:443
80.11.5.65:2222
184.179.14.130:22
156.205.103.107:995
67.61.157.208:443
93.113.177.152:443
24.209.209.72:443
197.206.132.79:443
72.240.200.181:2222
96.41.93.96:443
85.122.141.42:995
108.46.145.30:443
2.232.253.79:995
79.172.26.240:443
5.193.115.251:2222
71.182.142.63:443
72.28.255.159:995
85.204.189.105:443
196.151.252.84:443
98.240.24.57:443
67.82.244.199:2222
189.141.31.12:443
193.248.154.174:2222
120.151.95.167:443
178.222.114.132:995
172.87.134.226:443
151.45.108.75:443
173.47.125.178:995
24.139.72.117:443
45.118.216.157:443
74.75.237.11:443
24.187.56.74:2222
75.109.180.221:443
197.135.177.36:443
190.103.55.108:443
81.214.126.173:2222
87.27.110.90:2222
185.246.9.69:995
217.133.54.140:32100
78.97.3.6:443
189.150.40.192:2222
87.218.53.206:2222
181.169.88.203:443
94.49.188.240:443
46.124.107.124:6881
83.202.68.220:2222
47.187.49.3:2222
83.196.50.197:2222
2.90.33.130:443
109.209.94.165:2222
79.119.124.237:443
2.88.53.159:995
86.120.64.243:443
116.240.78.45:995
94.53.92.42:443
181.129.155.10:443
67.6.54.180:443
96.40.175.33:443
149.28.98.196:995
109.205.204.229:2222
45.63.107.192:2222
74.129.26.119:443
173.88.7.176:443
206.183.190.53:993
94.141.3.242:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
detection of qakbot malware 1 IoCs
Processes:
resource yara_rule behavioral1/memory/1548-57-0x0000000010000000-0x0000000010041000-memory.dmp qakbot -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 1548 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 1676 wrote to memory of 1548 1676 rundll32.exe rundll32.exe PID 1676 wrote to memory of 1548 1676 rundll32.exe rundll32.exe PID 1676 wrote to memory of 1548 1676 rundll32.exe rundll32.exe PID 1676 wrote to memory of 1548 1676 rundll32.exe rundll32.exe PID 1676 wrote to memory of 1548 1676 rundll32.exe rundll32.exe PID 1676 wrote to memory of 1548 1676 rundll32.exe rundll32.exe PID 1676 wrote to memory of 1548 1676 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\quakbotsamples\29148f550d02cf98d89efb53f7137da28e91df43790f4fc052a0f405f99edcc1.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\quakbotsamples\29148f550d02cf98d89efb53f7137da28e91df43790f4fc052a0f405f99edcc1.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1548-54-0x0000000000000000-mapping.dmp
-
memory/1548-55-0x0000000075EA1000-0x0000000075EA3000-memory.dmpFilesize
8KB
-
memory/1548-56-0x00000000001D0000-0x0000000000211000-memory.dmpFilesize
260KB
-
memory/1548-57-0x0000000010000000-0x0000000010041000-memory.dmpFilesize
260KB