General

  • Target

    238dcc5611ed9066b63d2d0109c9b623f54f8d7b61d5f9de59694cfc60a4e646.zip

  • Size

    452KB

  • Sample

    240402-mk638afa31

  • MD5

    138df7b46b25d339b429736597f9bf78

  • SHA1

    8c8daf054ae465d285a2fe59f5a7a874526efefb

  • SHA256

    b5f62b5c5fc6b14c1817aadd8b19027e763c00ecaf68934cef13c3b55a3c7290

  • SHA512

    f8c9075acc9d5488897b634b2a91cabd0e74dbe9b91c992374248f1fda8626cdd0da3f69c04c02eef8761d7cecddf66304f9411c3a2673dde163f57c5fce051c

  • SSDEEP

    12288:rrCU14EhVtq0ntIJ2Xn2Os2Z0Iu1FhWqUrb:VmyqUtIJ232OsM0Iu3Rmb

Score
10/10

Malware Config

Extracted

Family

pikabot

C2

154.53.55.165

158.247.240.58

154.12.236.248

Targets

    • Target

      238dcc5611ed9066b63d2d0109c9b623f54f8d7b61d5f9de59694cfc60a4e646.dll

    • Size

      840KB

    • MD5

      4b1518535af6344af39bd90aa02a6c0d

    • SHA1

      183b74ec94b19c1f4af194e4d606270053669913

    • SHA256

      238dcc5611ed9066b63d2d0109c9b623f54f8d7b61d5f9de59694cfc60a4e646

    • SHA512

      8644ec984504f56336fe583c61f4e86c103550eb9f8cf27c6342251da13ef2d0dff132bd2256fbe8e1958da788e0f9738636e9b1438851784934427ec7006cb0

    • SSDEEP

      24576:je9nfmpSVmL+Cf72yb1SFEtEfPmY4uRD7HpUMhOw8ghE:qBmpSVmLfCDfPJ4cDFPhmghE

    Score
    10/10
    • PikaBot

      PikaBot is a botnet that is distributed similarly to Qakbot and written in c++.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks