General

  • Target

    iebcqyhjfa.zip

  • Size

    839B

  • Sample

    230601-2bsa2ahb7s

  • MD5

    335ec5496a17042b9d112ac77c3da097

  • SHA1

    1b4aff69f71d455c32a3e755d2c37dd25f679c24

  • SHA256

    1fe9144a833c74b3d8a2d093c2d8e77e0edc7d311739fd0190891431662125d7

  • SHA512

    1a8e0b35747a2a9efb9ec8208358d086646385ffec0120c0ae21f8ac612179cdaaf4f12b86446c4e82fccfdb7a6e30aeeef8ed1eaf6b3bf55266a17c245172d1

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

obama266

Campaign

1685611378

C2

24.234.220.88:990

70.28.50.223:2078

96.56.197.26:2083

103.123.223.133:443

83.249.198.100:2222

199.27.66.213:443

90.104.151.37:2222

94.204.202.106:443

72.205.104.134:443

65.95.141.84:2222

82.131.141.209:443

77.126.99.230:443

71.38.155.217:443

205.237.67.69:995

84.215.202.8:443

24.234.220.88:465

76.178.148.107:2222

116.74.163.130:443

70.28.50.223:2087

147.147.30.126:2222

Targets

    • Target

      ProjectFunding_268488_Jun01.js

    • Size

      1KB

    • MD5

      4d4c10bc91a9f0f55ae4e3f13028e21c

    • SHA1

      ca582c0d141a690f6bb59c25fb7cc521f80d09d7

    • SHA256

      c103447a81a20f57e6b80dd939b58e442398d97e5c96acba87482af4ae433848

    • SHA512

      8dbbfc5e903ee05459899d14d95547dfaef78e42262f8c36bd94b27ab7a35cc7bbd2298ed9faded8eb6f2fda2d1d821192a13e4f030973d0270c76f9ca7137fe

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Blocklisted process makes network request

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks