General

  • Target

    238dcc5611ed9066b63d2d0109c9b623f54f8d7b61d5f9de59694cfc60a4e646.zip

  • Size

    452KB

  • Sample

    240402-qtks5abe4v

  • MD5

    0a1cf787ab16569c08e52a68bdfc1e7a

  • SHA1

    c110e9890e593566136be32958bde91840e9e4c3

  • SHA256

    b1753ad48699afc4c28f25672981420aa32c24f84083f64a30d59020f5ea15ec

  • SHA512

    eea941ccf84d50f6b88af035b107b582151ebbce7c491962888df85059f7936d6aebdb60c5103b4fe009e325fa2afdcc1ba5af0019c27485285d554895e07fce

  • SSDEEP

    12288:3HYtPAYmFvbvCrpziocMx0S6pLaf3xF0haHEfcNIL+dsy:XYpa21ziurZ3L7IKdsy

Score
10/10

Malware Config

Extracted

Family

pikabot

C2

154.53.55.165

158.247.240.58

154.12.236.248

Targets

    • Target

      238dcc5611ed9066b63d2d0109c9b623f54f8d7b61d5f9de59694cfc60a4e646.dll

    • Size

      840KB

    • MD5

      4b1518535af6344af39bd90aa02a6c0d

    • SHA1

      183b74ec94b19c1f4af194e4d606270053669913

    • SHA256

      238dcc5611ed9066b63d2d0109c9b623f54f8d7b61d5f9de59694cfc60a4e646

    • SHA512

      8644ec984504f56336fe583c61f4e86c103550eb9f8cf27c6342251da13ef2d0dff132bd2256fbe8e1958da788e0f9738636e9b1438851784934427ec7006cb0

    • SSDEEP

      24576:je9nfmpSVmL+Cf72yb1SFEtEfPmY4uRD7HpUMhOw8ghE:qBmpSVmLfCDfPJ4cDFPhmghE

    Score
    10/10
    • PikaBot

      PikaBot is a botnet that is distributed similarly to Qakbot and written in c++.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix

Tasks