General

  • Target

    ff7c3ebcd8cc98132ea7e06e72c73e0e5e60fc9b05c235b3ac105c9d83c64c97.zip

  • Size

    622KB

  • Sample

    240402-lyxw2add9w

  • MD5

    659345cb9b14e508bcf7808e724f20d6

  • SHA1

    d42abe74516668ef8f91ff61542da2d60a5b01ae

  • SHA256

    bb76c806b0dfea8a74b198753969ebb8b395c6986be7ca9f6bfd2ac80c3a848f

  • SHA512

    0d6165ff7e41c93aacefb22f95a455c801fd7af281eeed1263b2c5db159410a87e93eca3c36086775614a4912ae5f11b80d6a9bf2041ea7de04d52d05e7e2f58

  • SSDEEP

    12288:tDjialKjk5+12ZEfeEzoBz3YlA7o4ecYTC9v6GTUyDpTLnm5ZZgVKOWJGZrldbl9:Dek4FfeEzo53YlqbedW9CGTUytfKZZgl

Malware Config

Extracted

Family

pikabot

C2

https://109.199.99.131:13721

https://154.38.175.241:13721

https://148.113.141.220:2224

https://23.226.138.143:2083

https://89.117.23.186:5686

https://23.226.138.161:5242

https://103.82.243.5:13721

https://145.239.135.24:5243

https://185.179.217.216:9785

https://154.12.248.41:5000

https://178.18.246.136:2078

https://141.95.106.106:2967

https://104.129.55.105:2223

https://57.128.165.176:13721

https://89.117.23.185:2221

https://86.38.225.106:2221

https://37.60.242.86:2967

https://37.60.242.85:9785

https://89.117.23.34:5938

https://154.12.233.66:2224

Targets

    • Target

      ff7c3ebcd8cc98132ea7e06e72c73e0e5e60fc9b05c235b3ac105c9d83c64c97.exe

    • Size

      1.4MB

    • MD5

      d4651a1bb0851b8583ceddaa241e5335

    • SHA1

      f58e15da8521a8459ef411d8c02598f728791fd0

    • SHA256

      ff7c3ebcd8cc98132ea7e06e72c73e0e5e60fc9b05c235b3ac105c9d83c64c97

    • SHA512

      5381118b8081b2c4fada15eb6ea848a81d28e286fb389e0616a5c9ce368c05a5a6868bc24a9d9a0fd0649e0541cce332fec0ae9d82a1840ec8fbcbe3bbbe1639

    • SSDEEP

      24576:J3dhgAYmYqHU7pHYev00V6dCDdoVYdGp8VTALtMa6V:UmYqHU7pHYY00VcCDdowG3tMa6V

    • PikaBot

      PikaBot is a botnet that is distributed similarly to Qakbot and written in c++.

    • Pikabot family

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks