General

  • Target

    b025e37611168c0abcc446125a8bd7cb831625338434929febadfcc9cc4c816e.zip

  • Size

    1.2MB

  • Sample

    240402-lyv3fadh74

  • MD5

    ab24fc0089e85f9b7d0b2f68a2c21ae2

  • SHA1

    ff07cc5063caa611777488fa69e38786c8226515

  • SHA256

    3e0d4b3790b294270efa2897cac74faf1931acc8379f7a7bca36bd066bce6b9c

  • SHA512

    f54a7e43db4389f6ee3ec57f68ff1937ca97c2a613f7ef47fa220ccd7b3ac85e4e0cf3d7d97470153f9aa5e7658c95a8c23f29db3f38cc815b6375dbc181c053

  • SSDEEP

    24576:EBNbQmdOziG2Zt+e4Zl5R5XNnwwNbCynuwfBHEICSb4dSq:wUBzYt+eKLtBNxRfZhd4cq

Score
10/10

Malware Config

Extracted

Family

pikabot

C2

141.95.106.106

104.129.55.106

104.129.55.105

23.226.138.161

145.239.135.24

85.239.243.155

23.226.138.143

57.128.165.176

178.18.246.136

Targets

    • Target

      b025e37611168c0abcc446125a8bd7cb831625338434929febadfcc9cc4c816e.exe

    • Size

      3.3MB

    • MD5

      2a3a840641803b101b86e0c321b0a5fe

    • SHA1

      52bc3e121f44c4f9e71b43110f468886294c7fc2

    • SHA256

      b025e37611168c0abcc446125a8bd7cb831625338434929febadfcc9cc4c816e

    • SHA512

      00e9064564b7ff3acd0f76194dca7aa3d7124ff66b28fa2711908f6a1c013de781b89f6d8878f7f71e0176a3e4eee5b90a25e8338154ee580381741617464e57

    • SSDEEP

      49152:zCXtvRXOhEc2MgyyuTEGQp8EamZaFChW7ZaxJmLufu4I:zCxRXOhEc2MgJHTp+isL1

    Score
    10/10
    • PikaBot

      PikaBot is a botnet that is distributed similarly to Qakbot and written in c++.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks