General

  • Target

    yohlef.msi

  • Size

    404KB

  • Sample

    230601-va38ksfd62

  • MD5

    1ddfcbdbe07f551e561be159a73d1c99

  • SHA1

    1ffea8c6ba224b4a9e6bb402b030a8c12f2523e2

  • SHA256

    30384e44c5df96b7809a94c2320caeb8ea94d6c9a2d0bf5a10206bee397f1c26

  • SHA512

    aa92c5f5fb036ce0d83afd7c804cc07940d62291b1c431249bb4fc982721ac117f7fde6fb28d7a30261e8ccdddca694879d382b2bb8b1d09179b4913bd495264

  • SSDEEP

    12288:MxCriEQzPJLNee9Lp1NjAyefvDz7n5DY:sdzFLPNjAyef7z7FY

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

obama266

Campaign

1685611378

C2

24.234.220.88:990

70.28.50.223:2078

96.56.197.26:2083

103.123.223.133:443

83.249.198.100:2222

199.27.66.213:443

90.104.151.37:2222

94.204.202.106:443

72.205.104.134:443

65.95.141.84:2222

82.131.141.209:443

77.126.99.230:443

71.38.155.217:443

205.237.67.69:995

84.215.202.8:443

24.234.220.88:465

76.178.148.107:2222

116.74.163.130:443

70.28.50.223:2087

147.147.30.126:2222

Targets

    • Target

      yohlef.msi

    • Size

      404KB

    • MD5

      1ddfcbdbe07f551e561be159a73d1c99

    • SHA1

      1ffea8c6ba224b4a9e6bb402b030a8c12f2523e2

    • SHA256

      30384e44c5df96b7809a94c2320caeb8ea94d6c9a2d0bf5a10206bee397f1c26

    • SHA512

      aa92c5f5fb036ce0d83afd7c804cc07940d62291b1c431249bb4fc982721ac117f7fde6fb28d7a30261e8ccdddca694879d382b2bb8b1d09179b4913bd495264

    • SSDEEP

      12288:MxCriEQzPJLNee9Lp1NjAyefvDz7n5DY:sdzFLPNjAyef7z7FY

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Loads dropped DLL

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

MITRE ATT&CK Enterprise v6

Tasks