736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe
2MB
21-05-2022 10:53
behavioral1
7d05b151fd2b28582cfca8ca8ceaa58f
6d4d8baf550550ebd1e15f3b3a697f8516fe79cf
736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9
5e6b7105b5e36581a43b9d6e6e460c6ea08618a3b8fbad52f2aafdee4f4162dc40e6a723b03488dcf7f200ee251f3588c41cc41149739dfccc65988b29b77fb2
Extracted
Family | qakbot |
Version | 324.142 |
Botnet | spx135 |
Campaign | 1591627649 |
C2 |
89.32.216.156:443 74.222.204.82:443 24.183.39.93:443 97.93.211.17:443 80.14.209.42:2222 96.35.170.82:2222 151.73.124.242:443 98.110.231.63:443 108.227.161.27:995 173.3.132.17:995 31.5.41.52:443 24.122.228.88:443 5.107.208.94:2222 76.185.136.58:443 50.29.166.232:995 73.210.114.187:443 92.114.107.193:995 24.43.22.220:993 50.247.230.33:995 72.142.106.198:465 102.41.122.185:995 67.131.59.17:443 184.98.104.7:995 69.11.247.242:443 201.127.4.70:443 72.204.242.138:50003 189.231.198.212:443 5.14.44.173:2222 5.14.76.156:443 151.205.102.42:443 179.51.23.31:443 72.190.101.70:443 73.76.47.127:443 80.240.26.178:443 72.36.59.46:2222 73.209.113.58:443 68.49.120.179:443 69.92.54.95:995 187.19.151.218:995 50.244.112.10:443 66.222.88.126:995 207.255.161.8:32102 108.58.9.238:995 105.98.154.57:443 98.219.77.197:443 216.163.4.91:443 47.152.210.233:443 178.223.17.74:995 72.204.242.138:20 82.127.193.151:2222 |
Filter: none
-
Qakbot/Qbot
Description
Qbot or Qakbot is a sophisticated worm with banking capabilities.
Tags
-
Enumerates physical storage devices
Description
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
TTPs
-
Runs ping.exePING.EXE
TTPs
Reported IOCs
pid process 1132 PING.EXE -
Suspicious behavior: EnumeratesProcesses736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe
Reported IOCs
pid process 1800 736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe 956 736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe 956 736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe -
Suspicious use of WriteProcessMemory736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.execmd.exe
Reported IOCs
description pid process target process PID 1800 wrote to memory of 956 1800 736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe 736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe PID 1800 wrote to memory of 956 1800 736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe 736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe PID 1800 wrote to memory of 956 1800 736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe 736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe PID 1800 wrote to memory of 956 1800 736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe 736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe PID 1800 wrote to memory of 632 1800 736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe cmd.exe PID 1800 wrote to memory of 632 1800 736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe cmd.exe PID 1800 wrote to memory of 632 1800 736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe cmd.exe PID 1800 wrote to memory of 632 1800 736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe cmd.exe PID 632 wrote to memory of 1132 632 cmd.exe PING.EXE PID 632 wrote to memory of 1132 632 cmd.exe PING.EXE PID 632 wrote to memory of 1132 632 cmd.exe PING.EXE PID 632 wrote to memory of 1132 632 cmd.exe PING.EXE
-
C:\Users\Admin\AppData\Local\Temp\736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe"C:\Users\Admin\AppData\Local\Temp\736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe"Suspicious behavior: EnumeratesProcessesSuspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exeC:\Users\Admin\AppData\Local\Temp\736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe /CSuspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c ping.exe -n 6 127.0.0.1 & type "C:\Windows\System32\calc.exe" > "C:\Users\Admin\AppData\Local\Temp\736c373f09596e706dae01b4cb6a57647046f5047c8b67eb418d51b819a29ac9.exe"Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\PING.EXEping.exe -n 6 127.0.0.1Runs ping.exe
-
memory/632-60-0x0000000000000000-mapping.dmp
-
memory/956-57-0x0000000000000000-mapping.dmp
-
memory/956-59-0x0000000000400000-0x000000000069F000-memory.dmp
-
memory/1132-61-0x0000000000000000-mapping.dmp
-
memory/1800-55-0x0000000000220000-0x0000000000257000-memory.dmp
-
memory/1800-56-0x0000000000400000-0x000000000069F000-memory.dmp
-
memory/1800-54-0x0000000075C71000-0x0000000075C73000-memory.dmp