General

  • Target

    238dcc5611ed9066b63d2d0109c9b623f54f8d7b61d5f9de59694cfc60a4e646.zip

  • Size

    452KB

  • Sample

    240402-qcmldsaf3s

  • MD5

    f1290c00a98adc2890bbc0bbae62cbbf

  • SHA1

    0abb96509719cd0284017bbb0aa89ff2e721d25b

  • SHA256

    c7e5bce1be91494d1ce945b80f9fa76c36e98167a7ead070ba5f4153b7bcb11e

  • SHA512

    58883b6ecca1642d53614c974e5768394f0815a95d2dd079bae529a7752b42fcf1f8190821a088ce3eebdbea19235ef0d71d6a2407c90a44c762c7e477078376

  • SSDEEP

    12288:hOnk//T0MgNcliboz1OcnAAyThu6Z0kdsFy1rMdgkWU:hRHT07OlUC1X2uZusM1rcgS

Score
10/10

Malware Config

Extracted

Family

pikabot

C2

154.53.55.165

158.247.240.58

154.12.236.248

Targets

    • Target

      238dcc5611ed9066b63d2d0109c9b623f54f8d7b61d5f9de59694cfc60a4e646.dll

    • Size

      840KB

    • MD5

      4b1518535af6344af39bd90aa02a6c0d

    • SHA1

      183b74ec94b19c1f4af194e4d606270053669913

    • SHA256

      238dcc5611ed9066b63d2d0109c9b623f54f8d7b61d5f9de59694cfc60a4e646

    • SHA512

      8644ec984504f56336fe583c61f4e86c103550eb9f8cf27c6342251da13ef2d0dff132bd2256fbe8e1958da788e0f9738636e9b1438851784934427ec7006cb0

    • SSDEEP

      24576:je9nfmpSVmL+Cf72yb1SFEtEfPmY4uRD7HpUMhOw8ghE:qBmpSVmLfCDfPJ4cDFPhmghE

    Score
    10/10
    • PikaBot

      PikaBot is a botnet that is distributed similarly to Qakbot and written in c++.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks