General

  • Target

    98734d3ad1484aaa9405652bf8952e5f429e1298710647d6be3f9a2a53dc48ca.zip

  • Size

    452KB

  • Sample

    240402-qcm7xsah62

  • MD5

    2304214b8a7e830d936b202155f14a73

  • SHA1

    cfef73dddf29c33c1a5e34078e5f94547d153677

  • SHA256

    8f1850b1c10e00f85f0474e52db7106617d204487bfd92e7247770dee2cc710f

  • SHA512

    a924754e548258353648ba0183b87307f79242079ac7eacc7f0628d9ed7615d480278eca0c55ff04ae0f8483f9f0ecdc20006a4b11122ff767bc09bf05f5e5b7

  • SSDEEP

    12288:xcubmqtH3nKYMZo0iUy8cE3i+SYMVDyK1BvUC/AQv7h2Cvy:xcYmqt8iUy3+myKXtA+Z6

Score
10/10

Malware Config

Extracted

Family

pikabot

C2

154.53.55.165

158.247.240.58

154.12.236.248

Targets

    • Target

      98734d3ad1484aaa9405652bf8952e5f429e1298710647d6be3f9a2a53dc48ca.dll

    • Size

      840KB

    • MD5

      944072be4a458a1506d0fd47962b9b19

    • SHA1

      a138fcda691c0e98f0f266a787b514c0f89cbee8

    • SHA256

      98734d3ad1484aaa9405652bf8952e5f429e1298710647d6be3f9a2a53dc48ca

    • SHA512

      7d7976161a77e8d52b7dfa3d5713f937220ea9b7d5d4b7255409e45bf13b1a2955899d264f1babe1b7cb78e5f1971767f56b81495d8289f0b8bb57931292600e

    • SSDEEP

      24576:Be9nfmpSVmL+Cf72yb1SFEtEfPmY4uRD7HpUMhOw8ghE:gBmpSVmLfCDfPJ4cDFPhmghE

    Score
    10/10
    • PikaBot

      PikaBot is a botnet that is distributed similarly to Qakbot and written in c++.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks