Overview
overview
10Static
static
1RR.lnk
windows10-1703-x64
3RR.lnk
windows10-2004-x64
10head
windows10-1703-x64
1head
windows10-2004-x64
1vibrations...es.sql
windows10-1703-x64
3vibrations...es.sql
windows10-2004-x64
3vibrations/chill.exe
windows10-1703-x64
1vibrations/chill.exe
windows10-2004-x64
1vibrations/tears.cmd
windows10-1703-x64
1vibrations/tears.cmd
windows10-2004-x64
1General
-
Target
1YIRH.zip
-
Size
1.6MB
-
Sample
230222-v5gytsee9t
-
MD5
1fb90b12a538f97725e0023480569c3b
-
SHA1
46e572c6ed3b19eef6443ee3fde1389a82f0611a
-
SHA256
d48874475e0df4425298b6657e50c5bc73a19414c70d1ccf8defd2acf82e3fab
-
SHA512
db1a4b7a09bd3afec9d9db3a2edf030e8dabda6b375b71974375cc6edb1eff5cf950f8040faf1cb3b343ccdc13cc12eed0a4faeb317424fcdc5634e617a9337e
-
SSDEEP
24576:cJ1QlAt1lg2nnBtWThpnHwK1idC8e8X0GXB2IQxbS/5v1y6kg+v6Nkcv:cMl8lF2nx1v8HXhUzbK5w6Nnv
Static task
static1
Behavioral task
behavioral1
Sample
RR.lnk
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
RR.lnk
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
head
Resource
win10-20230220-en
Behavioral task
behavioral4
Sample
head
Resource
win10v2004-20230221-en
Behavioral task
behavioral5
Sample
vibrations/becomes.sql
Resource
win10-20230220-en
Behavioral task
behavioral6
Sample
vibrations/becomes.sql
Resource
win10v2004-20230221-en
Behavioral task
behavioral7
Sample
vibrations/chill.exe
Resource
win10-20230220-en
Behavioral task
behavioral8
Sample
vibrations/chill.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
vibrations/tears.cmd
Resource
win10-20230220-en
Behavioral task
behavioral10
Sample
vibrations/tears.cmd
Resource
win10v2004-20230220-en
Malware Config
Extracted
qakbot
404.9
BB16
1677046917
47.21.51.138:443
72.80.7.6:50003
82.127.204.82:2222
49.175.72.56:443
201.244.108.183:995
122.184.143.82:443
102.156.253.86:443
74.58.71.237:443
47.21.51.138:995
77.86.98.236:443
71.31.101.183:443
136.232.184.134:995
86.225.214.138:2222
95.242.101.251:995
109.11.175.42:2222
90.78.138.217:2222
184.176.35.223:2222
35.143.97.145:995
202.186.177.88:443
114.79.180.14:995
86.150.47.219:443
183.87.163.165:443
50.68.186.195:443
190.75.95.164:2222
98.145.23.67:443
67.10.175.47:2222
71.212.147.224:2222
88.126.94.4:50000
103.140.174.19:2222
103.231.216.238:443
78.84.123.237:995
180.151.108.14:443
80.47.57.131:2222
198.2.51.242:993
50.68.204.71:995
205.164.227.222:443
147.219.4.194:443
77.124.6.149:443
49.245.82.178:2222
46.10.198.107:443
76.80.180.154:995
12.172.173.82:32101
68.150.18.161:443
68.173.170.110:8443
24.9.220.167:443
12.172.173.82:2087
50.68.204.71:993
107.146.12.26:2222
81.229.117.95:2222
27.0.48.233:443
69.133.162.35:443
59.28.84.65:443
76.170.252.153:995
89.32.159.192:995
202.142.98.62:995
73.78.215.104:443
181.164.217.211:443
92.97.203.51:2222
116.74.164.26:443
103.141.50.102:995
149.74.159.67:2222
116.72.250.18:443
125.99.69.178:443
202.142.98.62:443
67.61.71.201:443
103.123.223.168:443
80.13.205.69:2222
80.0.74.165:443
86.99.54.39:2222
213.67.255.57:2222
176.142.207.63:443
50.67.17.92:443
217.165.1.53:2222
70.64.77.115:443
2.50.47.74:443
66.191.69.18:995
75.143.236.149:443
197.92.136.122:443
108.190.203.42:995
50.68.204.71:443
12.172.173.82:995
70.77.116.233:443
162.248.14.107:443
75.98.154.19:443
58.247.115.126:995
184.68.116.146:61202
41.99.50.76:443
184.68.116.146:3389
72.203.216.98:2222
103.252.7.231:443
12.172.173.82:50001
70.160.80.210:443
12.172.173.82:465
12.172.173.82:21
47.34.30.133:443
202.187.232.161:995
98.147.155.235:443
124.122.56.144:443
75.141.227.169:443
103.144.201.53:2078
172.248.42.122:443
12.172.173.82:990
24.239.69.244:443
173.18.126.3:443
73.165.119.20:443
90.104.22.28:2222
14.192.241.76:995
74.33.196.114:443
74.93.148.97:995
86.202.48.142:2222
174.104.184.149:443
12.172.173.82:20
109.151.144.37:443
104.35.24.154:443
114.143.176.234:443
84.35.26.14:995
45.50.233.214:443
64.237.185.60:443
73.161.176.218:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Targets
-
-
Target
RR.lnk
-
Size
1KB
-
MD5
f74323cd1cb9800e0f13383dd57e476f
-
SHA1
12ee2a1636466b349a817e05b6d01a16411812a3
-
SHA256
ff9b917e445b6d402236ce03427be1ffe5401c8e2cc5c0174cfdc846f9dc88df
-
SHA512
f6ffad96856202cfd847fdee53714d2556ed9f788577c3d704af9c98c7f46b041bcdfdc54d1d9822d0cd737eff02cf3d8b07e3c513d28a512e3d47fee62e742d
-
Checks computer location settings
Looks up country code configured in the registry, likely geofence.
-
Loads dropped DLL
-
-
-
Target
head
-
Size
200.0MB
-
MD5
c0b055ac335b87ef43bb2a21aa8560b6
-
SHA1
41f61541d6783406801ac13f591430d4c669583e
-
SHA256
4ef3bfcc09d1ee581e611ac67703d800fe261b823e50d339e7268c3a861ece53
-
SHA512
85540e3a4b9ae10d20c6bb823b132b72b5c58426a7f65906b979c60a75a01aea48084e2128d99242cdec830f1841b540105ba7b7811408e457753b8a83f6eef7
-
SSDEEP
3:N/t:n
Score1/10 -
-
-
Target
vibrations/becomes.sql
-
Size
1.6MB
-
MD5
e968e52be9e0e360b94f641644a835ff
-
SHA1
dfd6ae26c924469c9cde550b0a78c736e5ff40b4
-
SHA256
422f61c477effacce38fdf717bfb5c44558168687eae9be203e54cc97a6ae529
-
SHA512
bb404637d6de98c5ac26a4cc12db266e7678dc032338374aec7298f2ecb6964121aa07d55f7ea4c1461bd245cb313becb171a3cd8c431a991042f2f31216d52d
-
SSDEEP
12288:hgD7oi4JVR7GiHZJUMY4qSl9rBQpVvFBuLBmIiPy0Kko1KTVFufFKHcqgEQX0ekn:c7o9PrBeVXoY76Nj3gJ
Score3/10 -
-
-
Target
vibrations/chill.exe
-
Size
1.6MB
-
MD5
018796d4670ac12865be2f00382bbc8e
-
SHA1
8564027153dca487eca613345ab3b2de0add4f26
-
SHA256
22d1471ed17c681aa5580c59712005e1c70ef9c306cbcad245a64f7dfae47847
-
SHA512
4edac00e0d19b439c300328bf4f7abc98cadfce0d7f4283f1c6278bec24d0ed7c2e51090a2e584a7a2a2e645e396a890d9589fe3f660fa73fc238a09d827bc7b
-
SSDEEP
24576:qN2PGK9rDuNMZD22lHNFVntTX25fHSMv0UskeuzQU2z6IdcL6UCUK:qN2P39PuNYvlHTX2EMuZuzJ2z6nzK
Score1/10 -
-
-
Target
vibrations/tears.cmd
-
Size
240B
-
MD5
4d3327d333d155dce10f6b5d78ae046c
-
SHA1
364f765068aeb29cfbc7a3049599c158062feed6
-
SHA256
75317d6ee81f4495e61f97d17b4d6b76295727f5eaa89e5bf036398ba85ce686
-
SHA512
72702fcdeb926e2747bb4af811e88ed89b5f76153c35e4877732d5e29cdbda082f434e37099b74e5c83f63713d490428481a7d86de6fcbe0ba94cb5e7fba8e42
Score1/10 -