General

  • Target

    98734d3ad1484aaa9405652bf8952e5f429e1298710647d6be3f9a2a53dc48ca.zip

  • Size

    452KB

  • Sample

    240402-qtk4wsbg27

  • MD5

    35bd04e4c54e5cdb3bdae47b92ca642d

  • SHA1

    69af19229e4432ef4a1862b2d21c24f08d893752

  • SHA256

    00bbc9b5cf75b7e58c5371cdaacb3ea2795f5195ad407eaa871cf8caf85451d1

  • SHA512

    8c2572702759cfe7392ef17e474fa5133651d8f8e0a508311f9f22760797e5a8a10f9991c9973b2ec389d26fc0a6994d5957cefa8e85466f98e7448ac305cb96

  • SSDEEP

    12288:7RsgecmDLQqXC306Di6PR1w+V4ZZhnSRgqDsjZc:uDz006Di6WZARgq0c

Score
10/10

Malware Config

Extracted

Family

pikabot

C2

154.53.55.165

158.247.240.58

154.12.236.248

Targets

    • Target

      98734d3ad1484aaa9405652bf8952e5f429e1298710647d6be3f9a2a53dc48ca.dll

    • Size

      840KB

    • MD5

      944072be4a458a1506d0fd47962b9b19

    • SHA1

      a138fcda691c0e98f0f266a787b514c0f89cbee8

    • SHA256

      98734d3ad1484aaa9405652bf8952e5f429e1298710647d6be3f9a2a53dc48ca

    • SHA512

      7d7976161a77e8d52b7dfa3d5713f937220ea9b7d5d4b7255409e45bf13b1a2955899d264f1babe1b7cb78e5f1971767f56b81495d8289f0b8bb57931292600e

    • SSDEEP

      24576:Be9nfmpSVmL+Cf72yb1SFEtEfPmY4uRD7HpUMhOw8ghE:gBmpSVmLfCDfPJ4cDFPhmghE

    Score
    10/10
    • PikaBot

      PikaBot is a botnet that is distributed similarly to Qakbot and written in c++.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks