General

  • Target

    dd2b6e3aa75de8460730862f2dc739537734a7dfc9e673b6a23ee58430348ddf.zip

  • Size

    452KB

  • Sample

    240402-qcm7xsaf3z

  • MD5

    092925aa5abb06b9b20b5289617bac6f

  • SHA1

    6d376fe9b8b246e9d5e8e3c68682e30d4fb31121

  • SHA256

    6f1c462bcd1e30bb6affc20d6da7b3ae9bb5ed55edf66cac243270d421ec6b63

  • SHA512

    faa10b2b5ff48fe19d07e2e17a25deb2cf9b4f3f2ea23be4e2e27d0f980df952b71287ee634631f3683b4cab8489b822bdb049968a38e3b51bf018621ae6d1a3

  • SSDEEP

    6144:FEy/IJy75gWf9TM2kF62AeiK2ZWe5Y7lxrBvWZExGxeY5liOIEWVJFvDNHOD1iYQ:R5gWOtQKNeMCixGxH5l+ESJ9Do1H8B

Score
10/10

Malware Config

Extracted

Family

pikabot

C2

154.53.55.165

158.247.240.58

154.12.236.248

Targets

    • Target

      dd2b6e3aa75de8460730862f2dc739537734a7dfc9e673b6a23ee58430348ddf.dll

    • Size

      840KB

    • MD5

      bcc53210e13294cbd6a8172558d99295

    • SHA1

      02f78e1449ce844dc2807d850aab397d34ec35aa

    • SHA256

      dd2b6e3aa75de8460730862f2dc739537734a7dfc9e673b6a23ee58430348ddf

    • SHA512

      c78653407e87f4cd28bef5b9f1571039948dfce2c771ae9c2357160d97c6596f640887bbf898001f251ae4c62f727e25a5adb2487b7b583c73bf5f3dc0f2dda2

    • SSDEEP

      24576:2e9nfmpSVmL+Cf72yb1SFEtEfPmY4uRD7HpUMhOw8ghE:lBmpSVmLfCDfPJ4cDFPhmghE

    Score
    10/10
    • PikaBot

      PikaBot is a botnet that is distributed similarly to Qakbot and written in c++.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks