General
-
Target
Agreement_149596_Mar4.zip
-
Size
1.5MB
-
Sample
230314-yjq66abd71
-
MD5
b9de7fb7096221779de4edb9d7063674
-
SHA1
f8d8be30ae39d5dca8cb7bd3ae20de776630a632
-
SHA256
4fb872cb20c2e7878a7569d6595d9014d00941f32a873a32872455d14ac01626
-
SHA512
89e5050a5b3fd169b29ac6830d10760ad1962269b211410324c1e0808fc937a03fcc4200a86fde7f8c55b200c9eb15b7787b8e0164e565970b4bf98bdf5e048a
-
SSDEEP
49152:Gne4htjKuRbjWIBX8s1CPSaNWTHMUAiK0yBr0tvIN:GLt+AzUarTsUAiQ0tvIN
Static task
static1
Behavioral task
behavioral1
Sample
Agreement_149596_Mar4.zip
Resource
win10v2004-20230221-en
Behavioral task
behavioral2
Sample
Agreement_149596_Mar4.xll
Resource
win10v2004-20230220-en
Malware Config
Extracted
Extracted
qakbot
404.266
obama242
1678805546
92.239.81.124:443
176.202.46.81:443
2.49.58.47:2222
86.225.214.138:2222
74.66.134.24:443
213.31.90.183:2222
12.172.173.82:50001
202.187.87.178:995
70.53.96.223:995
92.154.45.81:2222
186.64.67.54:443
81.158.112.20:2222
190.191.35.122:443
68.173.170.110:8443
12.172.173.82:993
98.145.23.67:443
12.172.173.82:22
37.186.55.60:2222
84.216.198.124:6881
73.161.176.218:443
94.30.98.134:32100
78.196.246.32:443
12.172.173.82:995
88.122.133.88:32100
173.18.126.3:443
201.244.108.183:995
24.178.201.230:2222
76.27.40.189:443
151.65.134.135:443
197.14.148.149:443
197.244.108.123:443
201.137.185.109:443
86.130.9.213:2222
190.75.139.66:2222
213.67.255.57:2222
90.104.22.28:2222
189.222.53.217:443
122.184.143.84:443
92.159.173.52:2222
70.121.198.103:2078
91.68.227.219:443
86.236.114.212:2222
80.12.88.148:2222
178.175.187.254:443
73.36.196.11:443
47.196.225.236:443
65.95.49.237:2222
12.172.173.82:2087
184.176.35.223:2222
186.48.181.17:995
2.14.105.160:2222
208.180.17.32:2222
190.218.125.145:443
109.11.175.42:2222
23.251.92.171:2222
196.70.212.80:443
75.156.125.215:995
184.189.41.80:443
31.48.18.52:443
103.12.133.134:2222
70.51.152.61:2222
47.203.229.168:443
104.35.24.154:443
190.28.116.106:443
92.154.17.149:2222
103.169.83.89:443
86.169.103.3:443
92.27.86.48:2222
92.1.170.110:995
183.87.163.165:443
85.241.180.94:443
76.170.252.153:995
92.20.204.198:2222
103.141.50.102:995
81.229.117.95:2222
50.68.204.71:995
47.34.30.133:443
173.178.151.233:443
47.16.77.194:2222
83.92.85.93:443
76.80.180.154:995
67.70.23.222:2222
24.117.237.157:443
35.143.97.145:995
87.202.101.164:50000
64.237.245.195:443
103.231.216.238:443
74.93.148.97:995
103.71.21.107:443
71.65.145.108:443
12.172.173.82:465
72.80.7.6:50003
184.153.132.82:443
86.178.33.20:2222
94.200.183.66:2222
70.55.187.152:2222
98.159.33.25:443
136.35.241.159:443
24.187.145.201:2222
72.88.245.71:443
65.94.87.200:2222
184.176.110.61:61202
49.245.82.178:2222
12.172.173.82:32101
46.10.198.134:443
84.35.26.14:995
103.252.7.231:443
187.199.103.21:32103
139.5.239.14:443
202.142.98.62:443
27.109.19.90:2078
86.190.223.11:2222
75.143.236.149:443
50.68.204.71:993
91.169.12.198:32100
88.126.94.4:50000
24.239.69.244:443
12.172.173.82:21
174.104.184.149:443
116.72.250.18:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Targets
-
-
Target
Agreement_149596_Mar4.zip
-
Size
1.5MB
-
MD5
b9de7fb7096221779de4edb9d7063674
-
SHA1
f8d8be30ae39d5dca8cb7bd3ae20de776630a632
-
SHA256
4fb872cb20c2e7878a7569d6595d9014d00941f32a873a32872455d14ac01626
-
SHA512
89e5050a5b3fd169b29ac6830d10760ad1962269b211410324c1e0808fc937a03fcc4200a86fde7f8c55b200c9eb15b7787b8e0164e565970b4bf98bdf5e048a
-
SSDEEP
49152:Gne4htjKuRbjWIBX8s1CPSaNWTHMUAiK0yBr0tvIN:GLt+AzUarTsUAiQ0tvIN
Score1/10 -
-
-
Target
Agreement_149596_Mar4.xll
-
Size
589KB
-
MD5
78a955c3b47a84998496846e0c2b5e02
-
SHA1
50fb2484f1ea12ce984b23cd0ae62f11bcaf1ce4
-
SHA256
4cffeba29508cab8441f35dd6b09441f63f80214e117de6d07eaaa27fa841f8b
-
SHA512
150610b18d557b1799b1f2042f21cf2ca77160383527ee67092ca4783de921827440ab5e886e59172c9ad69432c8abe392a2198a079375098db82aa09e6788a9
-
SSDEEP
6144:8cTaT6oGCNIamrNSYVntapONtX7EmG2dOdQRG8l/dmMF7VndLmmmmmmm644tkw95:fSpSIm3OdQwgvpVndf42HXDiuJTMw4
Score1/10 -
-
-
Target
Agreement_149596a_Mar4.xll
-
Size
2.3MB
-
MD5
0970225251d70ef7ad16012784a78bbc
-
SHA1
3b3fd025639211b3a5dbf10a3dfd4aadbe7e3327
-
SHA256
3e18f7f569a95929ccc0fea8fb5c199d42bb764d844ee07e6ca00043b5ae2b6c
-
SHA512
734298a1e7b2f76773867c486979c245937d441d76f882200dc905e17b1121f8e5119e8a1f004659f83c68574597db835cfa39bb6f56413cb316a5bcce94cf1d
-
SSDEEP
49152:WjrGd3EfessB2KEAQ3PlAEIZ6QqrONloCt4nnM+DoRDPOjYvf9FB:arGd028KEl39AdZ/6y+9M7RDPZB
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Loads dropped DLL
-