General

  • Target

    b9655eb81e3602211ebebce01c24a6a7d8ece538a30347358204367b1db8dbea

  • Size

    1.0MB

  • Sample

    220508-1zmvsabfgp

  • MD5

    509e040532d9e25cf2ab63abacc66a62

  • SHA1

    514813962bd5bb96f567866e82860e59385284e2

  • SHA256

    a3d156a136a025ec465e1afd298990dd3ab6eb14b97613ba55e4a33e49704a6d

  • SHA512

    62a84a6bab628480b5022de40776031060d9d40d949e101713ea434b271fb64c883f52346ccb254ec2da85eb5a01484ce882cbb76c0169601def13dc3148427e

Malware Config

Extracted

Family

qakbot

Version

403.573

Botnet

obama180

Campaign

1650959141

C2

2.50.4.57:443

85.246.82.244:443

121.7.223.59:2222

197.161.137.67:993

38.70.253.226:2222

47.23.89.62:993

172.114.160.81:443

75.99.168.194:443

82.152.39.39:443

108.60.213.141:443

148.64.96.100:443

167.86.191.84:443

187.207.47.198:61202

103.107.113.120:443

203.122.46.130:443

106.51.48.170:50001

47.23.89.62:995

140.82.49.12:443

102.65.38.74:443

103.246.242.202:443

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Targets

    • Target

      ApplicationReject-1892714497.xlsb

    • Size

      1.1MB

    • MD5

      c794fd47792d403b39b380bcb2cf3e73

    • SHA1

      b930706641ef2bf78fd5d86e1b014efb24398258

    • SHA256

      3bd06b8d943a32fc42410049648d349bfb959cbe7d7ecda94da24d92f69292b0

    • SHA512

      7a912d258b28080c8d7c0ce8598e5c312c1c1b845045ac38aa1f76ce6620bdea927b64a98a6b9aef75d7149ea9ec806efd4779f64980dacc08beef647e1ae544

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Downloads MZ/PE file

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Tasks