General

  • Target

    3.dat.dll

  • Size

    589KB

  • Sample

    230314-v5ztmsgg86

  • MD5

    ff58f9cf0740aead678d9e36c0782894

  • SHA1

    5c2b6dd776b097dc0bff7a60361a4b026b19268d

  • SHA256

    b699dc3e5b1de51efb4e498cd2f1c7e9d3d08810ee8673c215f2aab0618e119c

  • SHA512

    a10c83ac5c47e316b4482d8f68e2a42973c055e39aaf5092e88abd58b45e60cb25a85f674a3328a490e8f06157a786600c56ce0af45b02b4743cdae590cdc9e9

  • SSDEEP

    6144:8cTaT6oGCNIamrNSYVntXpONtX7EmG2dOdQRG8l/dmMF7VndLmmmmmmm644tkw95:fPpSIm3OdQwgvpVndf42HXDiuJTMw4

Malware Config

Extracted

Family

qakbot

Version

404.266

Botnet

obama242

Campaign

1678805546

C2

92.239.81.124:443

176.202.46.81:443

2.49.58.47:2222

86.225.214.138:2222

74.66.134.24:443

213.31.90.183:2222

12.172.173.82:50001

202.187.87.178:995

70.53.96.223:995

92.154.45.81:2222

186.64.67.54:443

81.158.112.20:2222

190.191.35.122:443

68.173.170.110:8443

12.172.173.82:993

98.145.23.67:443

12.172.173.82:22

37.186.55.60:2222

84.216.198.124:6881

73.161.176.218:443

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Targets

    • Target

      3.dat.dll

    • Size

      589KB

    • MD5

      ff58f9cf0740aead678d9e36c0782894

    • SHA1

      5c2b6dd776b097dc0bff7a60361a4b026b19268d

    • SHA256

      b699dc3e5b1de51efb4e498cd2f1c7e9d3d08810ee8673c215f2aab0618e119c

    • SHA512

      a10c83ac5c47e316b4482d8f68e2a42973c055e39aaf5092e88abd58b45e60cb25a85f674a3328a490e8f06157a786600c56ce0af45b02b4743cdae590cdc9e9

    • SSDEEP

      6144:8cTaT6oGCNIamrNSYVntXpONtX7EmG2dOdQRG8l/dmMF7VndLmmmmmmm644tkw95:fPpSIm3OdQwgvpVndf42HXDiuJTMw4

    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Loads dropped DLL

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

2
T1082

Tasks