General

  • Target

    ContractCopy_CZ78.img

  • Size

    1.2MB

  • Sample

    221118-p2v4dsdc4y

  • MD5

    56c04688a27420a6dfabb12743822409

  • SHA1

    7d0fedc5579e1b70a11fddaa88e03e62b4c549c4

  • SHA256

    c09e3974dc7456748939ee9a302c0504946890a9d096fe238479e3fc833586dd

  • SHA512

    31df38acb9390ef0e8d98cae4372c898077dca555d5b9cf85de415897c45bf5a43c68cbd6f40a60e22511197df5113bd638e46ffb4555959a317149c154efa35

  • SSDEEP

    24576:wofd7QUoTzZWdfwTTn3M9XqdX+Di317qne:rVUtWdf6M9XmXSi317qne

Malware Config

Extracted

Family

qakbot

Version

404.30

Botnet

obama222

Campaign

1668692319

C2

105.184.161.242:443

73.36.196.11:443

82.31.37.241:443

24.116.45.121:443

213.67.255.57:2222

200.93.14.206:2222

188.54.79.88:995

87.220.205.14:2222

72.88.245.71:443

92.137.74.174:2222

91.68.227.219:443

184.153.132.82:443

74.66.134.24:443

47.16.73.77:2222

41.97.183.39:443

177.205.92.100:2222

24.64.114.59:3389

105.111.45.51:995

86.180.222.237:2222

76.184.95.190:993

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Targets

    • Target

      ContractCopy_CZ78.img

    • Size

      1.2MB

    • MD5

      56c04688a27420a6dfabb12743822409

    • SHA1

      7d0fedc5579e1b70a11fddaa88e03e62b4c549c4

    • SHA256

      c09e3974dc7456748939ee9a302c0504946890a9d096fe238479e3fc833586dd

    • SHA512

      31df38acb9390ef0e8d98cae4372c898077dca555d5b9cf85de415897c45bf5a43c68cbd6f40a60e22511197df5113bd638e46ffb4555959a317149c154efa35

    • SSDEEP

      24576:wofd7QUoTzZWdfwTTn3M9XqdX+Di317qne:rVUtWdf6M9XmXSi317qne

    Score
    3/10
    • Target

      ContractCopy.js

    • Size

      9KB

    • MD5

      2742a890585448b76564d92c0241fc89

    • SHA1

      e042878450347085e7111cd6b26e25e1bb5a10b5

    • SHA256

      77e3a3bc905f9a172e95ba70bf01c3236e6c6423f537fa728b1bda5a40a77fe3

    • SHA512

      3ed77de985924a16beeb40a101eaea154750eb3ecf401c05dcdad3abafee4f487b2436f11999bfa333d752a7c1df22234d3d5a2e46effca8e227721d8bd1db85

    • SSDEEP

      192:tSLjDJq0Tavgx685UIroAKbP2KTMhS0OGYm5llWVjAvNzAWMuEvk7MgG+r5A6:IVq2k785UIro8KTMhSeYm5P2jiuuEjP4

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Target

      addled/booksellers.tmp

    • Size

      781KB

    • MD5

      ba1953484c6e1a848e188f4fdf95546e

    • SHA1

      4352a670a751c62fe33fecbba6ec9dcf84c591e5

    • SHA256

      e4525d4812d75697a4b6524258a3e0325e49fce605c1691ba9fb6c2cfd2620ce

    • SHA512

      a5248b13438c9df1fdff1c240bd24c433b908fdcea2eb9ad82436391e5edc5f4aca1c6b51869fcbdadab1b9bcf03f536e137e788e60df02737d5982863d4f7c3

    • SSDEEP

      12288:3+ed7zMD42lTz4kgSWdf8+wawM375RGyin7ZlUP9XqcYX:Zd7QUoTzZWdfwTTn3M9XqdX

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

3
T1082

Query Registry

1
T1012

Tasks