General

  • Target

    238dcc5611ed9066b63d2d0109c9b623f54f8d7b61d5f9de59694cfc60a4e646.zip

  • Size

    452KB

  • Sample

    240402-lymfasdd7t

  • MD5

    93d8943653f76827c5ee564636c5e3db

  • SHA1

    66460143a0df5e8fb2bbef0880079dbb6aacf368

  • SHA256

    9c1e11dfb2cf7d64c4dceddda82c9e675b2e66bd34ab6f6a6e646404490e5378

  • SHA512

    9b7e8a0d933786043b093ef07a9416e68796812e406aab584bcff35bb32eebe4e64bea90a57a856fbc04e3b7e650cbb6912970cc93a69199b2268f9629635a4e

  • SSDEEP

    12288:NM5JwsrrcquL1nE1u8JHj0wG1dFmPJjgU5v:iTrzuhnE1DFAwOOhjL9

Score
10/10

Malware Config

Extracted

Family

pikabot

C2

154.53.55.165

158.247.240.58

154.12.236.248

Targets

    • Target

      238dcc5611ed9066b63d2d0109c9b623f54f8d7b61d5f9de59694cfc60a4e646.dll

    • Size

      840KB

    • MD5

      4b1518535af6344af39bd90aa02a6c0d

    • SHA1

      183b74ec94b19c1f4af194e4d606270053669913

    • SHA256

      238dcc5611ed9066b63d2d0109c9b623f54f8d7b61d5f9de59694cfc60a4e646

    • SHA512

      8644ec984504f56336fe583c61f4e86c103550eb9f8cf27c6342251da13ef2d0dff132bd2256fbe8e1958da788e0f9738636e9b1438851784934427ec7006cb0

    • SSDEEP

      24576:je9nfmpSVmL+Cf72yb1SFEtEfPmY4uRD7HpUMhOw8ghE:qBmpSVmLfCDfPJ4cDFPhmghE

    Score
    10/10
    • PikaBot

      PikaBot is a botnet that is distributed similarly to Qakbot and written in c++.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks