General

  • Target

    010d7315f99bfd5d5b9139825d8c25ab851869ab90b198338d33a7f72f3a509c

  • Size

    302KB

  • Sample

    241012-yqasrayerd

  • MD5

    254b31e9b3d2c0e19b804b972e67bc46

  • SHA1

    57963dc0c1f3da55255376e120114e2cd49db1db

  • SHA256

    010d7315f99bfd5d5b9139825d8c25ab851869ab90b198338d33a7f72f3a509c

  • SHA512

    8700c6982534575d9066fcabd55f335f3bc861baef04e2c39a901c09a813ec9388174ece1a1eafa045b2e894d808c93a71bb607b0daa30613886ffc74348e6ef

  • SSDEEP

    6144:8KMxrqxH6cd1b3QGLwUuxOd4RFxXGjjMvVCj/Go5NR:pHrdpjq4GFxXGHMvVCrdfR

Malware Config

Extracted

Family

qakbot

Version

325.42

Botnet

notset

Campaign

1596817234

Credentials

  • Protocol:
    ftp
  • Host:
    192.185.5.208
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    NxdkxAp4dUsY

  • Protocol:
    ftp
  • Host:
    162.241.218.118
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    EcOV0DyGVgVN

  • Protocol:
    ftp
  • Host:
    69.89.31.139
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    fcR7OvyLrMW6!

  • Protocol:
    ftp
  • Host:
    169.207.67.14
  • Port:
    21
  • Username:
    [email protected]
  • Password:
    eQyicNLzzqPN
C2

47.44.217.98:443

86.97.146.204:2222

65.60.228.130:443

216.201.162.158:443

94.59.24.79:995

108.46.145.30:443

24.139.132.70:443

47.206.174.82:443

188.52.106.206:20

72.204.242.138:6881

173.173.72.199:443

71.163.224.206:443

63.155.9.141:995

100.34.195.237:443

47.39.177.171:2222

96.20.108.17:2222

115.21.224.117:443

70.164.39.91:443

45.47.65.191:443

207.155.107.111:443

Targets

    • Target

      010d7315f99bfd5d5b9139825d8c25ab851869ab90b198338d33a7f72f3a509c

    • Size

      302KB

    • MD5

      254b31e9b3d2c0e19b804b972e67bc46

    • SHA1

      57963dc0c1f3da55255376e120114e2cd49db1db

    • SHA256

      010d7315f99bfd5d5b9139825d8c25ab851869ab90b198338d33a7f72f3a509c

    • SHA512

      8700c6982534575d9066fcabd55f335f3bc861baef04e2c39a901c09a813ec9388174ece1a1eafa045b2e894d808c93a71bb607b0daa30613886ffc74348e6ef

    • SSDEEP

      6144:8KMxrqxH6cd1b3QGLwUuxOd4RFxXGjjMvVCj/Go5NR:pHrdpjq4GFxXGHMvVCrdfR

    • Qakbot/Qbot

      Qbot or Qakbot is a sophisticated worm with banking capabilities.

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

MITRE ATT&CK Enterprise v15

Tasks