General
-
Target
Agreement_565062_Mar4.zip
-
Size
1.5MB
-
Sample
230317-bwanlsfg7w
-
MD5
0b265f5a0953658c55c7564c0ffe2ae3
-
SHA1
6fce07a967befbad61d09314137a825ff61e7f04
-
SHA256
a99bf6b8702db64be753b1ae2d7b6f3ccbf6c01ec0d70a7fd98d1b5011b844d6
-
SHA512
2bd2e95065bc17608c86d1bef71de861ab27e28a19582cc2fcfd30cbe45530e01b4204f3c9ad8f6476cb95a50c2c076322ee4d7208c3696872543529c3a77280
-
SSDEEP
49152:pgYH9s5svf+4PBRPSaNWTHMUAiK0yirbO8:pgE9XvflXarTsUAiNbO8
Static task
static1
Behavioral task
behavioral1
Sample
Agreement_565062_Mar4.xll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Agreement_565062_Mar4.xll
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
Agreement_565062a_Mar4.xll
Resource
win7-20230220-en
Malware Config
Extracted
qakbot
404.266
obama242
1678805546
92.239.81.124:443
176.202.46.81:443
2.49.58.47:2222
86.225.214.138:2222
74.66.134.24:443
213.31.90.183:2222
12.172.173.82:50001
202.187.87.178:995
70.53.96.223:995
92.154.45.81:2222
186.64.67.54:443
81.158.112.20:2222
190.191.35.122:443
68.173.170.110:8443
12.172.173.82:993
98.145.23.67:443
12.172.173.82:22
37.186.55.60:2222
84.216.198.124:6881
73.161.176.218:443
94.30.98.134:32100
78.196.246.32:443
12.172.173.82:995
88.122.133.88:32100
173.18.126.3:443
201.244.108.183:995
24.178.201.230:2222
76.27.40.189:443
151.65.134.135:443
197.14.148.149:443
197.244.108.123:443
201.137.185.109:443
86.130.9.213:2222
190.75.139.66:2222
213.67.255.57:2222
90.104.22.28:2222
189.222.53.217:443
122.184.143.84:443
92.159.173.52:2222
70.121.198.103:2078
91.68.227.219:443
86.236.114.212:2222
80.12.88.148:2222
178.175.187.254:443
73.36.196.11:443
47.196.225.236:443
65.95.49.237:2222
12.172.173.82:2087
184.176.35.223:2222
186.48.181.17:995
2.14.105.160:2222
208.180.17.32:2222
190.218.125.145:443
109.11.175.42:2222
23.251.92.171:2222
196.70.212.80:443
75.156.125.215:995
184.189.41.80:443
31.48.18.52:443
103.12.133.134:2222
70.51.152.61:2222
47.203.229.168:443
104.35.24.154:443
190.28.116.106:443
92.154.17.149:2222
103.169.83.89:443
86.169.103.3:443
92.27.86.48:2222
92.1.170.110:995
183.87.163.165:443
85.241.180.94:443
76.170.252.153:995
92.20.204.198:2222
103.141.50.102:995
81.229.117.95:2222
50.68.204.71:995
47.34.30.133:443
173.178.151.233:443
47.16.77.194:2222
83.92.85.93:443
76.80.180.154:995
67.70.23.222:2222
24.117.237.157:443
35.143.97.145:995
87.202.101.164:50000
64.237.245.195:443
103.231.216.238:443
74.93.148.97:995
103.71.21.107:443
71.65.145.108:443
12.172.173.82:465
72.80.7.6:50003
184.153.132.82:443
86.178.33.20:2222
94.200.183.66:2222
70.55.187.152:2222
98.159.33.25:443
136.35.241.159:443
24.187.145.201:2222
72.88.245.71:443
65.94.87.200:2222
184.176.110.61:61202
49.245.82.178:2222
12.172.173.82:32101
46.10.198.134:443
84.35.26.14:995
103.252.7.231:443
187.199.103.21:32103
139.5.239.14:443
202.142.98.62:443
27.109.19.90:2078
86.190.223.11:2222
75.143.236.149:443
50.68.204.71:993
91.169.12.198:32100
88.126.94.4:50000
24.239.69.244:443
12.172.173.82:21
174.104.184.149:443
116.72.250.18:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Extracted
Targets
-
-
Target
Agreement_565062_Mar4.xll
-
Size
589KB
-
MD5
9d8fe6351591a67b5e930c5163e05532
-
SHA1
e830c54bf8632bdf2b5ea00813347d373a79c266
-
SHA256
3719a95c4dd2cf519808d6b7c4341c42a64eb0dc5c6a14b579dd084adb46a8fc
-
SHA512
38ccf29c02b9877014e2b9ca843a9f53b177336d0930ac59433de7f8e21ad3b2b2bc232df111d2155c2d179181a19417f95f3a14d85ea2c66b4bc1cc5b4bb798
-
SSDEEP
6144:8cTaT6oGCNIamrNSYVntFpONtX7EmG2dOdQRG8l/dmMF7VndLmmmmmmm644tkw95:fNpSIm3OdQwgvpVndf42HXDiuJTMw4
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Loads dropped DLL
-
-
-
Target
Agreement_565062a_Mar4.xll
-
Size
2.3MB
-
MD5
9ae0533703855cd44bf13766c54e7b30
-
SHA1
ad12b0bdc614c24b87448b3f3eca853a9ec976fe
-
SHA256
50fa7ea5099ab599d306ecdfd637a2201971596f601372b675b3d0172a3d56aa
-
SHA512
10612182cebdf4968b988cde3580a1135281b1267c88fa5dc1acafe797027e12ffa2a4fcd143e0b1c49dfb7fe129e852bf1406d5fa11ca141f405705ad872e55
-
SSDEEP
49152:WjrTd3EfessB2KEAQ3PlAEIZ6QqrONloCt4nnM+DoRDPOjYvf9FB:arTd028KEl39AdZ/6y+9M7RDPZB
-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
Loads dropped DLL
-