Overview
overview
10Static
static
quakbotsam...c1.dll
windows7_x64
10quakbotsam...c1.dll
windows10-2004_x64
10quakbotsam...e1.dll
windows7_x64
10quakbotsam...e1.dll
windows10-2004_x64
10quakbotsam...60.dll
windows7_x64
10quakbotsam...60.dll
windows10-2004_x64
10quakbotsam...1b.dll
windows7_x64
10quakbotsam...1b.dll
windows10-2004_x64
10quakbotsam...a1.dll
windows7_x64
10quakbotsam...a1.dll
windows10-2004_x64
10Resubmissions
23-03-2022 16:54
220323-ve19sahca5 1023-03-2022 16:45
220323-t9cn8sdedq 1023-03-2022 08:56
220323-kwef8sbae3 10Analysis
-
max time kernel
4294182s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20220310-en -
submitted
23-03-2022 16:45
Static task
static1
Behavioral task
behavioral1
Sample
quakbotsamples/29148f550d02cf98d89efb53f7137da28e91df43790f4fc052a0f405f99edcc1.dll
Resource
win7-20220310-en
Behavioral task
behavioral2
Sample
quakbotsamples/29148f550d02cf98d89efb53f7137da28e91df43790f4fc052a0f405f99edcc1.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral3
Sample
quakbotsamples/62b038f2dc2ab995d036930a2eaa5f2dc67fb0ab884459d3fa6df653eec307e1.dll
Resource
win7-20220310-en
Behavioral task
behavioral4
Sample
quakbotsamples/62b038f2dc2ab995d036930a2eaa5f2dc67fb0ab884459d3fa6df653eec307e1.dll
Resource
win10v2004-en-20220113
Behavioral task
behavioral5
Sample
quakbotsamples/a16db0d2025dff39a4a0de4071ce0e73c6810ab497453ad67c16ba0980385f60.dll
Resource
win7-20220311-en
Behavioral task
behavioral6
Sample
quakbotsamples/a16db0d2025dff39a4a0de4071ce0e73c6810ab497453ad67c16ba0980385f60.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral7
Sample
quakbotsamples/a5bc6aad1c3205857cf8d29058f8a5283bdc743b9965b5b5d2e69df9a9b6bb1b.dll
Resource
win7-20220311-en
Behavioral task
behavioral8
Sample
quakbotsamples/a5bc6aad1c3205857cf8d29058f8a5283bdc743b9965b5b5d2e69df9a9b6bb1b.dll
Resource
win10v2004-20220310-en
Behavioral task
behavioral9
Sample
quakbotsamples/c59d033fa3a58112f7520113699c74552c4d12bb10783fa880359ec94affe2a1.dll
Resource
win7-20220311-en
General
-
Target
quakbotsamples/62b038f2dc2ab995d036930a2eaa5f2dc67fb0ab884459d3fa6df653eec307e1.dll
-
Size
337KB
-
MD5
1bcb097de905cbe1e9fc9683e1dea036
-
SHA1
df042b4a2c65a0d761f93baeb8ee4d06fbd33229
-
SHA256
62b038f2dc2ab995d036930a2eaa5f2dc67fb0ab884459d3fa6df653eec307e1
-
SHA512
89f6de104a2dd12040492d8836ac1819a4f857c4e6554848b68d5ca51fe7b2bd5d860403954af45a67cad42bc9909ef94fa9175e20580cfe5c6a8d14d2386b29
Malware Config
Extracted
qakbot
401.51
abc106m
1606921461
94.69.242.254:2222
189.140.45.48:995
37.182.244.124:2222
73.136.242.114:443
187.149.126.53:443
189.210.115.207:443
96.27.47.70:2222
185.163.221.77:2222
85.132.36.111:2222
178.87.10.110:443
120.150.218.241:995
68.224.121.148:993
78.101.145.96:61201
47.146.34.236:443
24.95.61.62:443
72.29.181.78:2222
93.113.177.152:443
87.218.53.206:2222
106.51.85.162:443
2.90.33.130:443
187.145.100.209:443
81.150.181.168:2222
98.240.24.57:443
109.154.193.21:2222
96.40.175.33:443
72.240.200.181:2222
2.7.202.106:2222
173.21.10.71:2222
187.213.136.249:995
189.252.72.41:995
66.97.247.15:443
75.109.180.221:443
72.252.201.69:443
109.209.94.165:2222
65.29.116.74:443
172.87.134.226:443
69.11.247.242:443
87.27.110.90:2222
217.133.54.140:32100
181.129.155.10:443
187.213.199.54:443
174.104.31.209:443
67.8.103.21:443
71.182.142.63:443
149.28.98.196:443
45.77.193.83:443
68.116.193.239:443
197.45.110.165:995
149.28.98.196:2222
149.28.99.97:443
144.202.38.185:2222
174.62.13.151:443
144.202.38.185:443
149.28.98.196:995
45.63.107.192:995
144.202.38.185:995
45.63.107.192:2222
189.150.40.192:2222
149.28.99.97:2222
72.79.79.92:0
116.240.78.45:995
45.118.216.157:443
95.77.223.148:443
83.202.68.220:2222
92.154.83.96:2087
41.227.82.102:443
41.205.16.89:443
86.98.89.173:2222
156.194.205.151:995
47.44.217.98:443
24.27.82.216:2222
24.229.150.54:995
71.14.110.199:443
5.15.225.109:443
47.187.49.3:2222
78.97.207.104:443
67.6.54.180:443
178.222.114.132:995
89.3.198.238:443
109.205.204.229:2222
143.178.135.25:2222
90.53.228.60:2222
95.76.27.6:443
184.89.71.68:443
85.204.189.105:443
197.161.154.132:443
176.45.233.94:995
50.244.112.10:995
75.170.145.25:443
72.28.255.159:995
108.190.151.108:2222
51.235.24.196:443
94.59.236.155:995
78.187.125.116:2222
85.52.72.32:2222
174.54.24.110:995
189.231.3.63:443
86.121.43.200:443
193.248.154.174:2222
105.103.33.188:443
37.210.133.63:995
102.185.242.27:443
39.36.30.92:995
73.244.83.199:443
2.90.186.243:995
68.15.109.125:443
86.245.87.251:2222
197.135.54.239:443
90.101.117.122:2222
96.225.88.23:443
2.50.56.81:443
47.21.192.182:2222
93.146.133.102:2222
72.66.47.70:443
96.21.251.127:2222
184.98.97.227:995
58.179.21.147:995
201.152.69.198:995
74.129.26.119:443
67.82.244.199:2222
80.14.22.234:2222
189.157.3.12:443
83.196.50.197:2222
90.23.117.67:2222
208.93.202.41:443
47.22.148.6:443
197.86.204.38:443
45.32.162.253:443
120.150.60.189:995
110.142.205.182:443
72.36.59.46:2222
196.204.207.111:443
181.208.249.141:443
140.82.27.132:443
45.32.165.134:443
71.226.140.73:443
85.98.177.32:443
87.238.133.187:995
92.137.138.52:2222
24.179.13.119:443
78.63.226.32:443
71.163.223.144:443
68.131.19.52:443
86.98.34.84:995
65.131.47.74:995
92.154.83.96:1194
217.162.149.212:443
78.181.19.134:443
151.33.226.156:443
73.51.245.231:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
detection of qakbot malware 1 IoCs
Processes:
resource yara_rule behavioral3/memory/1668-57-0x0000000010000000-0x0000000010056000-memory.dmp qakbot -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
rundll32.exepid process 1668 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
Processes:
rundll32.exedescription pid process target process PID 284 wrote to memory of 1668 284 rundll32.exe rundll32.exe PID 284 wrote to memory of 1668 284 rundll32.exe rundll32.exe PID 284 wrote to memory of 1668 284 rundll32.exe rundll32.exe PID 284 wrote to memory of 1668 284 rundll32.exe rundll32.exe PID 284 wrote to memory of 1668 284 rundll32.exe rundll32.exe PID 284 wrote to memory of 1668 284 rundll32.exe rundll32.exe PID 284 wrote to memory of 1668 284 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\quakbotsamples\62b038f2dc2ab995d036930a2eaa5f2dc67fb0ab884459d3fa6df653eec307e1.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\quakbotsamples\62b038f2dc2ab995d036930a2eaa5f2dc67fb0ab884459d3fa6df653eec307e1.dll,#12⤵
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1668-54-0x0000000000000000-mapping.dmp
-
memory/1668-55-0x0000000075C41000-0x0000000075C43000-memory.dmpFilesize
8KB
-
memory/1668-56-0x0000000000330000-0x0000000000370000-memory.dmpFilesize
256KB
-
memory/1668-57-0x0000000010000000-0x0000000010056000-memory.dmpFilesize
344KB