General

  • Target

    98734d3ad1484aaa9405652bf8952e5f429e1298710647d6be3f9a2a53dc48ca.zip

  • Size

    452KB

  • Sample

    240402-lyt55sdd8w

  • MD5

    492aaad958045ea2ed653033e0b9d675

  • SHA1

    c385554e170fa274ab0d74933cf71ff9d68d58c9

  • SHA256

    3f64c8d1db4d3883e308749174b2bb5a271df68471722683e4b809947d6b4b10

  • SHA512

    06ce27849815e8b82557a9c1eda0a0fb027bcb1ca9c723d3f12e76c448f5580e334906ed03ad84a84d422f72eaf8c881e189e9c0a2214a8dc8ea86500c0b84f2

  • SSDEEP

    12288:/tV0CsUCYMdA/80IMXaxvZm+rQtXblmbIj:lV0NU8a/80IMX+DrQ1lmu

Score
10/10

Malware Config

Extracted

Family

pikabot

C2

154.53.55.165

158.247.240.58

154.12.236.248

Targets

    • Target

      98734d3ad1484aaa9405652bf8952e5f429e1298710647d6be3f9a2a53dc48ca.dll

    • Size

      840KB

    • MD5

      944072be4a458a1506d0fd47962b9b19

    • SHA1

      a138fcda691c0e98f0f266a787b514c0f89cbee8

    • SHA256

      98734d3ad1484aaa9405652bf8952e5f429e1298710647d6be3f9a2a53dc48ca

    • SHA512

      7d7976161a77e8d52b7dfa3d5713f937220ea9b7d5d4b7255409e45bf13b1a2955899d264f1babe1b7cb78e5f1971767f56b81495d8289f0b8bb57931292600e

    • SSDEEP

      24576:Be9nfmpSVmL+Cf72yb1SFEtEfPmY4uRD7HpUMhOw8ghE:gBmpSVmLfCDfPJ4cDFPhmghE

    Score
    10/10
    • PikaBot

      PikaBot is a botnet that is distributed similarly to Qakbot and written in c++.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks