Overview
overview
10Static
static
Claim_VA43/Claim.lnk
windows7-x64
10Claim_VA43/Claim.lnk
windows10-2004-x64
10Claim_VA43...al.dll
windows7-x64
10Claim_VA43...al.dll
windows10-2004-x64
10Claim_VA43...ng.cmd
windows7-x64
1Claim_VA43...ng.cmd
windows10-2004-x64
1Claim_VA43...ll.cmd
windows7-x64
1Claim_VA43...ll.cmd
windows10-2004-x64
1General
-
Target
Claim_VA43.zip
-
Size
340KB
-
Sample
221205-g687tadc24
-
MD5
d92939cee7d6dfa2d1a81b27e77d4d29
-
SHA1
139982bb9f05e63acb4e2b07cf71a8dc47a289c2
-
SHA256
3add81df661ac839af450f5d23bb523c985d612be46cf3fee21213c12a177ea4
-
SHA512
87bf45c20b71d59cc25e13ed99ec93af5197e1f1e509377270ecde23dc25b4f2028e146a76c651fb27e759fc2d7f78c435c0dc6c7487a39b6efb2396b4452fc1
-
SSDEEP
6144:N583V7YI1mSPpeuWydPtYMb3dnooP2/zaIwcguiefFwDxFWrZe5YjEZ5JsAn8cGI:b8FBJeuWev3+yK3guQDxwe5YjEB8cGkd
Static task
static1
Behavioral task
behavioral1
Sample
Claim_VA43/Claim.lnk
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
Claim_VA43/Claim.lnk
Resource
win10v2004-20221111-en
Behavioral task
behavioral3
Sample
Claim_VA43/elizabeth/appeal.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
Claim_VA43/elizabeth/appeal.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral5
Sample
Claim_VA43/elizabeth/avoiding.cmd
Resource
win7-20221111-en
Behavioral task
behavioral6
Sample
Claim_VA43/elizabeth/avoiding.cmd
Resource
win10v2004-20220901-en
Behavioral task
behavioral7
Sample
Claim_VA43/elizabeth/quill.cmd
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
Claim_VA43/elizabeth/quill.cmd
Resource
win10v2004-20221111-en
Malware Config
Extracted
qakbot
404.46
obama225
1669974461
85.59.61.52:2222
66.191.69.18:995
186.64.67.9:443
174.104.184.149:443
91.165.188.74:50000
213.22.188.57:2222
173.18.126.3:443
90.89.95.158:2222
172.90.139.138:2222
78.100.230.10:995
184.153.132.82:443
41.100.146.58:443
85.152.152.46:443
75.99.125.235:2222
83.92.85.93:443
173.239.94.212:443
24.64.114.59:2222
74.66.134.24:443
98.145.23.67:443
213.67.255.57:2222
92.24.200.226:995
91.68.227.219:443
12.172.173.82:993
70.120.228.205:2083
216.196.245.102:2078
176.142.207.63:443
217.128.91.196:2222
24.228.132.224:2222
69.119.123.159:2222
201.208.139.250:2222
91.169.12.198:32100
64.121.161.102:443
87.221.197.110:2222
86.159.48.25:2222
103.141.50.117:995
41.62.182.1:443
92.186.69.229:2222
37.14.229.220:2222
123.3.240.16:995
70.160.80.210:443
176.128.178.251:443
12.172.173.82:995
94.63.65.146:443
78.163.33.44:443
74.92.243.113:50000
75.98.154.19:443
197.204.18.30:443
121.122.99.223:995
58.247.115.126:995
78.69.251.252:2222
213.91.235.146:443
76.80.180.154:995
130.43.99.103:995
93.156.103.241:443
93.24.192.142:20
41.62.220.86:995
12.172.173.82:465
92.185.204.18:2078
75.143.236.149:443
90.119.197.132:2222
80.13.179.151:2222
47.41.154.250:443
81.229.117.95:2222
92.189.214.236:2222
108.162.6.34:443
72.68.175.55:2222
84.35.26.14:995
12.172.173.82:990
188.54.99.243:995
92.239.81.124:443
92.27.86.48:2222
83.114.60.6:2222
216.196.245.102:2083
71.247.10.63:995
58.162.223.233:443
184.155.91.69:443
178.153.195.40:443
116.74.162.186:443
76.100.159.250:443
88.171.156.150:50000
156.216.253.65:995
73.161.176.218:443
70.115.104.126:995
109.159.119.169:2222
24.64.114.59:3389
87.223.89.157:443
89.129.109.27:2222
70.66.199.12:443
183.82.100.110:2222
142.161.27.232:2222
108.6.249.139:443
69.133.162.35:443
76.127.192.23:443
12.172.173.82:21
199.83.165.233:443
174.77.209.5:443
87.202.101.164:50000
90.104.22.28:2222
83.7.54.186:443
184.176.154.83:995
90.116.219.167:2222
92.207.132.174:2222
136.232.184.134:995
92.149.205.238:2222
86.225.214.138:2222
24.64.114.59:61202
198.2.51.242:993
70.51.136.94:2222
12.172.173.82:50001
75.158.15.211:443
85.61.165.153:2222
181.164.194.228:443
47.34.30.133:443
86.195.32.149:2222
41.34.106.203:993
72.200.109.104:443
196.207.146.214:443
24.206.27.39:443
172.117.139.142:995
190.18.236.175:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Targets
-
-
Target
Claim_VA43/Claim.lnk
-
Size
1KB
-
MD5
52382b9ff4bb3a20c4cdd47157c82354
-
SHA1
71112f1fe1fd65072a2ac0587ac9f8ec97b08357
-
SHA256
4fb9d922825e7bf57d6d08cd8fe213e8f7a09e81ded12b16623df981cf328f4b
-
SHA512
258848a55fca4ab49a1c609e341f0aae2f95a4271a7b904cd88092976d25fa98618ba0e13f5ddbb782d90a769dad586c58a730abf3b0ce988eefc3428d14fb78
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
-
-
Target
Claim_VA43/elizabeth/appeal.tmp
-
Size
444KB
-
MD5
b6211857d1820eafb23533f1c7c85d69
-
SHA1
0e6b9c55461be182343c5b41f22478a6192d0bb6
-
SHA256
cdb5054cad1e68121b529340f0b37490bffb1eb6c7f7186dc01f8d7e9081d3a5
-
SHA512
23c71ea5954dbf7710a7b6519cbf9a7929a81dcc5685c985dd6b58ea54958b979f89cc4be37da22485f36344f52fe9d4a42fd8a680c8a981dc60bbc426d28b68
-
SSDEEP
12288:BWyGWZDZ9FkHkmqnfsd5Ja46fDV3+QWc2:AOZ6Hk2JajfRO8
-
-
-
Target
Claim_VA43/elizabeth/avoiding.cmd
-
Size
231B
-
MD5
87c2039515bad30f39e91703dba92c1f
-
SHA1
8373525d59f973458a0716348bfbcff442f519ae
-
SHA256
8bd1b1354ea1a20f9bf7073b2cbdb7340d76ff0c312afe09fb2eea750ddf9f87
-
SHA512
79f0daf51dfd10e916af1a311e44f65904c4f06277b1b29eddeeef7d30abb4826697a85646f342f954e80c09a0baee2f20c929f8d2e680e62b0a42d8279edb27
Score1/10 -
-
-
Target
Claim_VA43/elizabeth/quill.cmd
-
Size
289B
-
MD5
f1dd476ff792c640945a21901988c957
-
SHA1
57543ec07ada751d7c104393b0ea33f15f1cbb6f
-
SHA256
224cb4a5898c0bd293bd61d89647f59ea0032d59e42ea1945a9e0812a0e83b22
-
SHA512
3283b7112f19784f230fe676abbcd07f884793a25fbf0b27f3d0f166e16f9bcb647ad3abd910c3882046d51f1e684cc24704bd5188d4dfbcfc19d6a440dff31a
Score1/10 -
MITRE ATT&CK Matrix
Collection
Command and Control
Credential Access
Defense Evasion
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation