General

  • Target

    ContractCopy3862.html

  • Size

    978KB

  • Sample

    221118-r59r3ahf46

  • MD5

    1118f053697a3048b19099fb2acd284a

  • SHA1

    dee050fc962253582dd0660f648a69a11b364f92

  • SHA256

    9f7eb4e5382c19d8e3ecbc71f13aaf467df4f61a835fee78ca199bdd3b7178ca

  • SHA512

    c0247925481973b621d263ecfa7c68c85ba6b8f6fcbfa2eb283cbad8b8e13dd0df015a34b8985526a956b010f588960ed347f0d24d60969667f2b88c48b82bcc

  • SSDEEP

    24576:D0R0eQGLbURy4/kZf1CvbWs3O0IITkgPGW3MK:D0lylhaIfL

Malware Config

Extracted

Family

qakbot

Version

404.30

Botnet

obama222

Campaign

1668692319

C2

105.184.161.242:443

73.36.196.11:443

82.31.37.241:443

24.116.45.121:443

213.67.255.57:2222

200.93.14.206:2222

188.54.79.88:995

87.220.205.14:2222

72.88.245.71:443

92.137.74.174:2222

91.68.227.219:443

184.153.132.82:443

74.66.134.24:443

47.16.73.77:2222

41.97.183.39:443

177.205.92.100:2222

24.64.114.59:3389

105.111.45.51:995

86.180.222.237:2222

76.184.95.190:993

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Targets

    • Target

      ContractCopy3862.html

    • Size

      978KB

    • MD5

      1118f053697a3048b19099fb2acd284a

    • SHA1

      dee050fc962253582dd0660f648a69a11b364f92

    • SHA256

      9f7eb4e5382c19d8e3ecbc71f13aaf467df4f61a835fee78ca199bdd3b7178ca

    • SHA512

      c0247925481973b621d263ecfa7c68c85ba6b8f6fcbfa2eb283cbad8b8e13dd0df015a34b8985526a956b010f588960ed347f0d24d60969667f2b88c48b82bcc

    • SSDEEP

      24576:D0R0eQGLbURy4/kZf1CvbWs3O0IITkgPGW3MK:D0lylhaIfL

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

4
T1012

System Information Discovery

5
T1082

Peripheral Device Discovery

2
T1120

Tasks