General

  • Target

    98734d3ad1484aaa9405652bf8952e5f429e1298710647d6be3f9a2a53dc48ca.zip

  • Size

    452KB

  • Sample

    240402-mk71hsfe44

  • MD5

    501511eee812a414ecf43410b853cacf

  • SHA1

    298927b9e31d043989381d83e467e3c71ed83e8c

  • SHA256

    b018e6bcfa564ce6ced261cc542615060d0893043cbfc528f6d20bb6450404c8

  • SHA512

    e042dd52eeb9952eebdea62157be8c8595c61c916c5f74f017e045e1e28b5f575423e2383464b7afc9feeffdc55b8f4a1ad30ee39dea95ccbc50c9935bbc1afd

  • SSDEEP

    6144:nxyMD5zMVGfcbxN92k0eIpV7I5C+IneeQa71PHhogP9f281RZZ3J/pBWRU0zbWTo:sMD5zFfKjMdI5CndbPHmUo8xz/WRUIbv

Score
10/10

Malware Config

Extracted

Family

pikabot

C2

154.53.55.165

158.247.240.58

154.12.236.248

Targets

    • Target

      98734d3ad1484aaa9405652bf8952e5f429e1298710647d6be3f9a2a53dc48ca.dll

    • Size

      840KB

    • MD5

      944072be4a458a1506d0fd47962b9b19

    • SHA1

      a138fcda691c0e98f0f266a787b514c0f89cbee8

    • SHA256

      98734d3ad1484aaa9405652bf8952e5f429e1298710647d6be3f9a2a53dc48ca

    • SHA512

      7d7976161a77e8d52b7dfa3d5713f937220ea9b7d5d4b7255409e45bf13b1a2955899d264f1babe1b7cb78e5f1971767f56b81495d8289f0b8bb57931292600e

    • SSDEEP

      24576:Be9nfmpSVmL+Cf72yb1SFEtEfPmY4uRD7HpUMhOw8ghE:gBmpSVmLfCDfPJ4cDFPhmghE

    Score
    10/10
    • PikaBot

      PikaBot is a botnet that is distributed similarly to Qakbot and written in c++.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks