Resubmissions

01-05-2024 10:14

240501-l945gsef62 10

01-05-2024 10:10

240501-l7lv5acd8z 10

01-05-2024 10:06

240501-l5drqscd4z 10

General

  • Target

    0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118

  • Size

    4.2MB

  • Sample

    240501-l945gsef62

  • MD5

    0b84369c3ae7ea35924c82465ae768c8

  • SHA1

    9a263fe01ce2d94a7054905323f596ef8cd6047b

  • SHA256

    06d60d2e4f630514526ac63ab10360a1405899f4dac32888d231f5fcf9abb2d1

  • SHA512

    fbc19f8fbddffd0806e41d0b33b93cfaded708687d9d514543ce8302eb351222df4c6ff90df9a52e4371aa4ba3fb272672c850b92ecb0179f5618d7e01f5c6bc

  • SSDEEP

    6144:UfqGzAH5bdSZRg4WR223vZezQDP9RB49qRqe90hfduo+Ppt:U9kHXsRO2auufi6qNi

Malware Config

Extracted

Family

qakbot

Version

325.14

Botnet

tr01

Campaign

1596554163

C2

94.59.241.189:2222

86.98.66.175:2222

94.96.84.73:993

71.83.16.211:443

24.110.96.149:443

78.96.199.79:443

216.201.162.158:443

68.60.221.169:465

95.76.109.181:443

189.231.175.46:443

70.164.37.205:995

108.27.217.44:443

71.220.191.200:443

92.59.35.196:2222

71.192.44.92:443

108.30.125.94:443

93.151.180.170:61202

189.130.26.216:443

47.146.32.175:443

24.71.28.247:443

Extracted

Family

stealc

rc4.plain

Extracted

Family

vidar

Version

9.3

Botnet

03cea2609023d13f145ac6c5dc897112

C2

https://steamcommunity.com/profiles/76561199680449169

https://t.me/r1g1o

Attributes
  • profile_id_v2

    03cea2609023d13f145ac6c5dc897112

  • user_agent

    Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.0.0 Safari/537.36 OPR/101.0.0.0

Targets

    • Target

      0b84369c3ae7ea35924c82465ae768c8_JaffaCakes118

    • Size

      4.2MB

    • MD5

      0b84369c3ae7ea35924c82465ae768c8

    • SHA1

      9a263fe01ce2d94a7054905323f596ef8cd6047b

    • SHA256

      06d60d2e4f630514526ac63ab10360a1405899f4dac32888d231f5fcf9abb2d1

    • SHA512

      fbc19f8fbddffd0806e41d0b33b93cfaded708687d9d514543ce8302eb351222df4c6ff90df9a52e4371aa4ba3fb272672c850b92ecb0179f5618d7e01f5c6bc

    • SSDEEP

      6144:UfqGzAH5bdSZRg4WR223vZezQDP9RB49qRqe90hfduo+Ppt:U9kHXsRO2auufi6qNi

    • Detect Vidar Stealer

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Stealc

      Stealc is an infostealer written in C++.

    • Vidar

      Vidar is an infostealer based on Arkei stealer.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks