General

  • Target

    Document#628698(Sep15).html

  • Size

    711KB

  • Sample

    220915-x1mpmahfcr

  • MD5

    e0661d7b6ed908ef7dc3729c5d5ff490

  • SHA1

    2436ee0bedab029ea4c572991c9c91b7c848ee5d

  • SHA256

    d8d9546524fd6a6a73e482991fa6c516d111e9e5307a3dd3c547629c4183a3e2

  • SHA512

    895c08c3367b741e8594194f92995a03ed2d13635288f27443fce303da1a2105fcfaf62e25bc6d1b8fb62ffdf4fdc3342522f0c9289dd12cd7a380d39b2d17e6

  • SSDEEP

    12288:zYJ5iDt+F2+FNB2v6tAk2f6yDveji/yBiqyUqFnF:wcDkkcN46tHyLVsiqEdF

Malware Config

Extracted

Family

qakbot

Version

403.892

Botnet

obama203

Campaign

1663242106

C2

81.131.161.131:2078

217.165.85.223:993

37.210.148.30:995

200.161.62.126:32101

78.100.225.34:2222

119.82.111.158:443

66.181.164.43:443

134.35.13.45:443

193.3.19.37:443

99.232.140.205:2222

197.94.210.133:443

87.243.113.104:995

84.38.133.191:443

14.184.97.67:443

123.240.131.1:443

194.166.207.160:995

78.168.87.170:2222

180.180.131.95:443

41.96.56.224:443

190.44.40.48:995

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Targets

    • Target

      Document#628698(Sep15).html

    • Size

      711KB

    • MD5

      e0661d7b6ed908ef7dc3729c5d5ff490

    • SHA1

      2436ee0bedab029ea4c572991c9c91b7c848ee5d

    • SHA256

      d8d9546524fd6a6a73e482991fa6c516d111e9e5307a3dd3c547629c4183a3e2

    • SHA512

      895c08c3367b741e8594194f92995a03ed2d13635288f27443fce303da1a2105fcfaf62e25bc6d1b8fb62ffdf4fdc3342522f0c9289dd12cd7a380d39b2d17e6

    • SSDEEP

      12288:zYJ5iDt+F2+FNB2v6tAk2f6yDveji/yBiqyUqFnF:wcDkkcN46tHyLVsiqEdF

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks