General

  • Target

    SY47.img

  • Size

    970KB

  • Sample

    221118-djpccacd4t

  • MD5

    29e17166ce121051c53ab529afe3cd89

  • SHA1

    dfd3f52cb5042b2862d668fffbb88125c1548e6e

  • SHA256

    729bab0c3c0e5fc33b56f2d645e5f75791b307cefe9df976ca41f22028e66c36

  • SHA512

    7fa71fd5c73afd201da976adc4654bfdc114fa5bdc15bf1fc1fbc6d28a9b405669522e0ab2928bd7357adc1184842fc2b6fb0d08b4406e700e7d0393af73b4b4

  • SSDEEP

    12288:cov6F+DfZxL4+Dir8lkQ5z4hbEmKFX4GfOs5VBNYRbWAUWWvoYPiwBPhKwnONVvo:cov6F+DRt4Tr8lkBhQp2QOUDKw9

Malware Config

Extracted

Family

qakbot

Version

404.30

Botnet

BB06

Campaign

1668670510

C2

86.225.214.138:2222

71.183.236.133:443

182.66.197.35:443

70.66.199.12:443

76.80.180.154:995

180.151.104.143:443

92.149.205.238:2222

83.110.223.247:443

183.87.31.34:443

105.103.50.1:990

103.141.50.117:995

105.103.50.1:465

105.103.50.1:22

86.130.9.167:2222

86.99.15.243:2222

90.104.22.28:2222

172.117.139.142:995

176.142.207.63:443

142.161.27.232:2222

71.247.10.63:50003

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Extracted

Family

qakbot

Attributes
  • salt

    ~�w%��N$���0��U��J��m�/(

Targets

    • Target

      SY47.img

    • Size

      970KB

    • MD5

      29e17166ce121051c53ab529afe3cd89

    • SHA1

      dfd3f52cb5042b2862d668fffbb88125c1548e6e

    • SHA256

      729bab0c3c0e5fc33b56f2d645e5f75791b307cefe9df976ca41f22028e66c36

    • SHA512

      7fa71fd5c73afd201da976adc4654bfdc114fa5bdc15bf1fc1fbc6d28a9b405669522e0ab2928bd7357adc1184842fc2b6fb0d08b4406e700e7d0393af73b4b4

    • SSDEEP

      12288:cov6F+DfZxL4+Dir8lkQ5z4hbEmKFX4GfOs5VBNYRbWAUWWvoYPiwBPhKwnONVvo:cov6F+DRt4Tr8lkBhQp2QOUDKw9

    Score
    3/10
    • Target

      WW.js

    • Size

      9KB

    • MD5

      929850e164f506d9b429065395f4a6dc

    • SHA1

      581b7c1ee9b1e7e42c5dbce21f3b2e1a6311309e

    • SHA256

      3109a31f7313b6ae587c8c12cbe16f27b1e7ca39c77884d68092daee9b670c18

    • SHA512

      b0116cf02124fa85250c4acc4e1485bf5f73558fad22a9112074577986f834dcfbda38f2adb6bf322047e7c5d2c538bacca5324d90b47592c2becc4a070125a9

    • SSDEEP

      192:bSLjDJq0Tavgx685UIroAKbP2KTMhS0OGYm5llWVjAvNzAWMuEvk7MgG+r5A6:yVq2k785UIro8KTMhSeYm5P2jiuuEjP4

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Target

      animators/chorister.tmp

    • Size

      835KB

    • MD5

      ea84a4b868e7e781ef45b0980df1b150

    • SHA1

      3de4bffe779a871804bd1bf04800744aa8346bb7

    • SHA256

      3b663cd072a16d24dec14cea2da0efa37b696dffb55773cf96f5d1b6a8ba6ce1

    • SHA512

      9f24f99cfdb87a0d12b0347a54724e80a5b6a03ae0b12dac75cdd1dd48ba6c6d709409a64805b285cd9c6fd2a36ddf896afb16f32d68d165ff8bca138b1227a4

    • SSDEEP

      12288:T6F+DfZxL4+Dir8lkQ5z4hbEmKFX4GfOs5VBNYRbWAUWWvoYPiwBP:T6F+DRt4Tr8lkBhQp2QOU

MITRE ATT&CK Enterprise v6

Tasks