General

  • Target

    Molestiaecorporis3598922429.zip

  • Size

    316KB

  • Sample

    220915-13skfahhcp

  • MD5

    d76f1487ae47024379d4080a24d90df3

  • SHA1

    50e090daf2706465d970c05b7abb8ae3e4d79e68

  • SHA256

    cb0696751a7091d93b715c3f01a17692d3a729785b99db814e8b67181cbbc813

  • SHA512

    33524cb09120fe75beb84578256da73efe5affe70f278261576788305c7ed94edd8b785484c54d7f9192bf0959f45b512930449a033bb2e311690905d6dcd8e0

  • SSDEEP

    6144:UE9Iv4kxmsYBH/Y4+h0uW8TOQa9CLSQI/vHYeA4/v44VxTgG8:vqw4msYBQZhrX3LzIH4eA4ozT

Malware Config

Extracted

Family

qakbot

Version

403.892

Botnet

BB

Campaign

1663241219

C2

81.131.161.131:2078

217.165.85.223:993

37.210.148.30:995

200.161.62.126:32101

78.100.225.34:2222

119.82.111.158:443

66.181.164.43:443

134.35.13.45:443

193.3.19.37:443

99.232.140.205:2222

197.94.210.133:443

87.243.113.104:995

84.38.133.191:443

14.184.97.67:443

123.240.131.1:443

194.166.207.160:995

78.168.87.170:2222

180.180.131.95:443

41.99.21.248:443

190.44.40.48:995

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Targets

    • Target

      MainReport#245033.iso

    • Size

      666KB

    • MD5

      23ebd088d81c4c0f73c892db827f7673

    • SHA1

      85a2e28efe44e72cd8d5aed22940b665237e4572

    • SHA256

      b1cd73c3b2e86ea798ca2107f366c27aefcafe354db671171521e933a577901b

    • SHA512

      c29f96e4aafd39b2ef2ecab6f12a777818fdda6eca96d666cb5f331013d9f14ee5206eeabe12ef7ba8b16aff81b1a68646c12a4eebf2595c5c8ba8e1e6436f35

    • SSDEEP

      12288:Nj13EEe5jhTc9RWV0ukYTO0jZtWo16VZo/2LXs7nj7:Nh3CFc9RQhu6Z4o1kZpLXs7nj7

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks