General

  • Target

    fafdd87991351ff0fa2b888a9d22fc058f1a08a6c08651d7ee0164740c70ec51.zip

  • Size

    622KB

  • Sample

    240402-lyxk9sdh85

  • MD5

    cd3110b3820036d07791176269e5a15b

  • SHA1

    70f6b7c2c163491360169ac13cd2307ccf7124a0

  • SHA256

    fdf1024fe9464ecf5c4fcce6ad2ce09e9c707b2e44de0127f1b8a53d14000166

  • SHA512

    02cf7036bda72f74e13549a79710a0e40c0e2341e863d63e35bf98792eef2b4fe00c9ea7621469342d53fb8dead27afcf74765e83906f34978688ecaa5c4d3e3

  • SSDEEP

    12288:n5NJfSHOVoIbQygzdgDI0FYwgGNv+Wye5KiRb6Iy/:/EHOVoIbOWDswGWyw36d

Score
10/10

Malware Config

Extracted

Family

pikabot

C2

109.199.99.131

154.38.175.241

23.226.138.143

23.226.138.161

145.239.135.24

178.18.246.136

141.95.106.106

104.129.55.105

57.128.165.176

Targets

    • Target

      fafdd87991351ff0fa2b888a9d22fc058f1a08a6c08651d7ee0164740c70ec51.exe

    • Size

      1.4MB

    • MD5

      51813e18e119f2839f48afe00ac99ed8

    • SHA1

      7f0d60a0e87499891c5d7944ac8e8b6252ca6eb7

    • SHA256

      fafdd87991351ff0fa2b888a9d22fc058f1a08a6c08651d7ee0164740c70ec51

    • SHA512

      07ca9af7adfbfa32c3b0e095d3b306f1c44d72750efe3b347ed391895445191599166ef731f9eb2742bdf4006d4caffb3aeb18de65f65befc1c6be349a205e98

    • SSDEEP

      24576:13dhgAYmYqHU7pHYev00V6dCDdoVYdGp8VTALtMa6u:AmYqHU7pHYY00VcCDdowG3tMa6u

    Score
    10/10
    • PikaBot

      PikaBot is a botnet that is distributed similarly to Qakbot and written in c++.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks