General
-
Target
7736356120.zip
-
Size
644KB
-
Sample
220713-2p9r8sbhgk
-
MD5
b20eebe7b16cca711157ae1c22b6fa66
-
SHA1
6b11f27fa642ccc6ded83161cdaea593401b85a9
-
SHA256
d8d3a7b073ccf33ba301011c49f5ab3d2507904fd6aa5b13ba4efd400d57873a
-
SHA512
452f2151b4af3be55916c9ad5b00ce722eac7562deb14bb68da72cdbc0b2b524bb7c32ddaff891456fe7b979568a1c686d3af98a945a735ba1e86611f95764c3
Static task
static1
Malware Config
Extracted
qakbot
403.780
vip01
1657721813
67.209.195.198:443
63.143.92.99:995
148.64.96.100:443
72.252.157.93:990
72.252.157.93:995
89.101.97.139:443
76.25.142.196:443
47.180.172.159:443
67.165.206.193:993
32.221.224.140:995
70.46.220.114:443
176.45.218.138:995
174.69.215.101:443
24.54.48.11:443
86.97.10.37:443
81.158.239.251:2078
37.34.253.233:443
120.150.218.241:995
186.90.153.162:2222
38.70.253.226:2222
41.228.22.180:443
217.165.157.202:995
179.111.8.52:32101
172.115.177.204:2222
190.252.242.69:443
31.215.185.213:1194
208.107.221.224:443
24.158.23.166:995
70.51.137.244:2222
39.44.116.107:995
31.215.185.213:2222
47.23.89.60:993
24.55.67.176:443
93.48.80.198:995
24.139.72.117:443
69.14.172.24:443
197.89.11.169:443
66.230.104.103:443
92.132.132.81:2222
24.178.196.158:2222
174.80.15.101:2083
187.116.126.216:32101
100.38.242.113:995
37.186.58.99:995
84.241.8.23:32103
182.191.92.203:995
40.134.246.185:995
106.193.213.197:995
86.98.78.118:993
117.248.109.38:21
74.14.5.179:2222
39.49.48.167:995
172.114.160.81:443
179.158.105.44:443
196.203.37.215:80
94.59.15.180:2222
39.52.55.99:995
89.211.209.234:2222
1.161.118.53:995
94.36.193.176:2222
121.7.223.45:2222
104.34.212.7:32103
45.46.53.140:2222
118.163.113.140:443
173.21.10.71:2222
47.145.130.171:443
47.156.129.52:443
72.252.157.93:993
187.172.164.12:443
197.94.92.5:443
201.172.23.72:2222
82.41.63.217:443
109.12.111.14:443
85.6.232.221:2222
96.37.113.36:993
217.128.122.65:2222
2.178.120.112:61202
193.136.1.58:443
103.133.11.10:995
120.61.3.142:443
182.52.159.24:443
37.208.131.49:50010
173.174.216.62:443
103.246.242.202:443
106.51.48.188:50001
67.69.166.79:2222
45.241.254.69:993
88.240.59.52:443
39.41.18.76:995
86.213.75.30:2078
39.57.56.11:995
24.43.99.75:443
101.50.67.155:995
108.56.213.219:995
189.253.167.141:443
5.32.41.45:443
39.53.160.99:995
80.11.74.81:2222
41.84.224.109:443
103.116.178.85:995
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Targets
-
-
Target
362e56855844fb2be3dfae4b566ab676f6ec681fad1c1a2e8eb6d245d56b83f5
-
Size
676KB
-
MD5
a0d132cdc67c29abf79ecf455c4a4e25
-
SHA1
2b278de35e52d695b27e1c880d35db04daa982bf
-
SHA256
362e56855844fb2be3dfae4b566ab676f6ec681fad1c1a2e8eb6d245d56b83f5
-
SHA512
645d2e3a168667de44d04756f48fe1d7d6581efc0755dccd72f6e09e603300783777b3b3376bb0d2bfab4c1ad3d239845eb606acffc3ea4ea4261d451c427ddf
-
Blocklisted process makes network request
-
Loads dropped DLL
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
Drops file in System32 directory
-