General
-
Target
Claim_Letter#494780.iso
-
Size
430KB
-
Sample
220914-r5ayqsecgk
-
MD5
13355c76c11d17bb2542608e3104fa88
-
SHA1
6b6174b23ac8039c32e09c59cd91afee8bac792a
-
SHA256
b47bf41986964ec1f181f023eacc2c10eed2ad556f64d402bec61b39e60aae69
-
SHA512
acd6a637009f0e27d397ed6a8d8f5e88fac9bfc2b1f48c0747d3e44e80e17659c181b31c3163a80a7eef2e0d83efb4e58b8c5789a6209e7f993abaacbe988d8d
-
SSDEEP
6144:gu8T9zrStWm3C3klS1gqbe5L05kVxVFInAPexY5ixyizO8wj+A:78ZSg24Vbe5LFVxVFIAPWelSZm
Static task
static1
Behavioral task
behavioral1
Sample
Claim_Letter.lnk
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
Claim_Letter.lnk
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
about/theyAs.bat
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
about/theyAs.bat
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
about/wantNo.dll
Resource
win7-20220901-en
Behavioral task
behavioral6
Sample
about/wantNo.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
about/yourWay.js
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
about/yourWay.js
Resource
win10v2004-20220812-en
Malware Config
Extracted
qakbot
403.858
obama202
1663062752
99.232.140.205:2222
41.69.118.117:995
179.111.111.88:32101
37.210.148.30:995
47.146.182.110:443
191.97.234.238:995
64.207.215.69:443
88.233.194.154:2222
81.131.161.131:2078
86.98.156.176:993
200.161.62.126:32101
88.244.84.195:443
78.100.254.17:2222
85.114.99.34:443
113.170.216.154:443
194.49.79.231:443
193.3.19.37:443
84.38.133.191:443
175.110.231.67:443
191.84.204.214:995
123.240.131.1:443
197.94.210.133:443
196.92.172.24:8443
186.50.245.74:995
70.51.132.197:2222
100.1.5.250:995
151.234.97.239:990
78.182.113.80:443
91.116.160.252:443
41.96.171.218:443
105.99.217.147:995
105.109.138.89:443
41.97.64.224:443
134.35.11.110:443
41.248.89.135:443
81.214.220.237:443
187.205.222.100:443
95.136.41.50:443
190.158.58.236:443
105.99.80.23:443
190.44.40.48:995
105.197.192.21:995
181.127.138.30:443
167.60.82.242:995
196.112.34.71:443
88.251.38.53:443
68.224.229.42:443
37.37.206.87:995
37.76.197.124:443
188.157.6.170:443
109.158.159.179:993
68.50.190.55:443
181.111.20.201:443
31.166.116.171:443
84.238.253.171:443
197.49.50.44:443
169.159.95.135:2222
45.160.124.211:995
113.22.102.155:443
211.248.176.4:443
186.167.249.206:443
85.98.206.165:995
139.195.132.210:2222
182.213.208.5:443
201.177.163.176:443
45.183.234.180:443
98.180.234.228:443
184.82.110.50:995
179.24.245.193:995
94.99.110.157:995
181.56.125.32:443
119.42.124.18:443
181.231.229.133:443
2.89.78.130:993
70.81.121.237:2222
181.81.116.144:443
197.11.128.156:443
41.142.132.190:443
105.111.60.60:995
154.238.151.197:995
156.219.49.22:995
154.181.136.133:995
179.223.89.154:995
102.101.231.141:443
220.116.250.45:443
138.0.114.166:443
62.114.193.186:995
85.98.46.114:443
184.99.123.118:443
186.120.58.88:443
46.186.216.41:32100
156.213.107.29:995
27.73.215.46:32102
68.151.196.147:995
181.59.3.118:443
68.129.232.158:443
45.241.140.181:995
212.156.51.194:443
87.75.195.211:443
1.10.253.207:443
87.220.229.164:2222
109.200.165.82:443
41.105.197.244:443
190.59.247.136:995
219.69.103.199:443
61.105.45.244:443
105.105.104.0:443
169.1.47.111:443
210.195.18.76:2222
125.26.54.57:995
88.246.170.2:443
95.10.13.82:443
171.248.157.128:995
118.68.220.199:443
139.195.63.45:2222
118.216.99.232:443
181.80.133.202:443
102.40.236.32:995
46.116.229.16:443
61.70.29.53:443
179.108.32.195:443
171.238.230.59:443
81.56.22.251:995
31.32.180.179:443
197.204.209.38:443
186.64.87.202:443
85.139.203.42:32101
120.150.218.241:995
173.189.167.21:995
24.139.72.117:443
104.34.212.7:32103
47.23.89.61:995
24.55.67.176:443
172.115.177.204:2222
217.165.77.134:995
24.178.196.158:2222
67.209.195.198:443
111.125.245.116:995
39.49.67.4:995
78.101.202.75:50010
37.34.253.233:443
217.165.77.134:443
46.107.48.202:443
70.46.220.114:443
63.143.92.99:995
93.48.80.198:995
179.158.103.236:443
47.180.172.159:443
47.23.89.61:993
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Targets
-
-
Target
Claim_Letter.lnk
-
Size
1KB
-
MD5
dbd85a01084c83ed79c8a6f9b597d946
-
SHA1
4b3942fe61f8138c7b7921f9f9c164eda42e0b0d
-
SHA256
f0e17e8f3be3618a8cf4cb6587401c777682ee81b0da220dc3867235f150e691
-
SHA512
bfb9415b5da616ea7af26544c4134e903db2c0ab8d92ee811fe8bf52da6d8169afd82957fa991aaafe124ef7ac42413d710efc5b79d11a28d872cf8d7b017f38
Score3/10 -
-
-
Target
about/theyAs.bat
-
Size
39B
-
MD5
9a910c488735e7a50bab462ee0c64d62
-
SHA1
50036dc5d04fbaf6ccf72b69f298fe97d1480d08
-
SHA256
14c7f388a6c989e830168056c04232c51112241142cc5a645a4c09647402470b
-
SHA512
0c178709264e93a7ae061e1b9d88d468f55ee2ecdae4650b07109a4c32db3d7dd4757f20719bb0273a4ed0619da46c4e8fe31d8a54d8507750ff3e8cad862be9
Score1/10 -
-
-
Target
about/wantNo.db
-
Size
368KB
-
MD5
aaabcb8c5464c4fdb6d72816f77f3b65
-
SHA1
7397d48671bde4ef13ae59f3427f0c1a1e7977d4
-
SHA256
1cbd5c3072fd99bff1408bc1f8a3b09206322de8b83b743a57efa24adefdb44f
-
SHA512
c5165a9e1f8185a94256bb67cf89d035f743e461795f0444208ee116df53bec5633673527cf52727462a8c543286c2f05f74dcc16078e5a1d2689ea434876546
-
SSDEEP
6144:0u8T9zrStWm3C3klS1gqbe5L05kVxVFInAPexY5ixyizO8wj+A:/8ZSg24Vbe5LFVxVFIAPWelSZm
-
Loads dropped DLL
-
Drops file in System32 directory
-
-
-
Target
about/yourWay.js
-
Size
208B
-
MD5
af846a60602a389b008dfa8d584daff7
-
SHA1
68217022f4b7bc88b913d7eae5bcebd11eef0ae2
-
SHA256
13b4e28dc14b82e7201f198fc99d400a3cfbc6d21a2cdeba73e3a3772922ad56
-
SHA512
7c5f87f9d1ac08bbd0dfa6ef2675192dbfe06236c753c0fe0b11c03ac177d4e7d18da263c03c4040d3251e9b01f50edb4b1325f9b54c9cf4c50a1de4771c66d2
Score3/10 -