General

  • Target

    b025e37611168c0abcc446125a8bd7cb831625338434929febadfcc9cc4c816e.exe

  • Size

    3.3MB

  • Sample

    240223-f7dxmabh4x

  • MD5

    2a3a840641803b101b86e0c321b0a5fe

  • SHA1

    52bc3e121f44c4f9e71b43110f468886294c7fc2

  • SHA256

    b025e37611168c0abcc446125a8bd7cb831625338434929febadfcc9cc4c816e

  • SHA512

    00e9064564b7ff3acd0f76194dca7aa3d7124ff66b28fa2711908f6a1c013de781b89f6d8878f7f71e0176a3e4eee5b90a25e8338154ee580381741617464e57

  • SSDEEP

    49152:zCXtvRXOhEc2MgyyuTEGQp8EamZaFChW7ZaxJmLufu4I:zCxRXOhEc2MgJHTp+isL1

Score
10/10

Malware Config

Extracted

Family

pikabot

C2

141.95.106.106

104.129.55.106

104.129.55.105

23.226.138.161

145.239.135.24

85.239.243.155

23.226.138.143

57.128.165.176

178.18.246.136

Targets

    • Target

      b025e37611168c0abcc446125a8bd7cb831625338434929febadfcc9cc4c816e.exe

    • Size

      3.3MB

    • MD5

      2a3a840641803b101b86e0c321b0a5fe

    • SHA1

      52bc3e121f44c4f9e71b43110f468886294c7fc2

    • SHA256

      b025e37611168c0abcc446125a8bd7cb831625338434929febadfcc9cc4c816e

    • SHA512

      00e9064564b7ff3acd0f76194dca7aa3d7124ff66b28fa2711908f6a1c013de781b89f6d8878f7f71e0176a3e4eee5b90a25e8338154ee580381741617464e57

    • SSDEEP

      49152:zCXtvRXOhEc2MgyyuTEGQp8EamZaFChW7ZaxJmLufu4I:zCxRXOhEc2MgJHTp+isL1

    Score
    10/10
    • PikaBot

      PikaBot is a botnet that is distributed similarly to Qakbot and written in c++.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks