General
-
Target
JaffaCakes118_cab72ace08bfd9114939c22f04a5524d
-
Size
1.1MB
-
Sample
250109-rzjzfsskgx
-
MD5
cab72ace08bfd9114939c22f04a5524d
-
SHA1
4cbc3ac583a001e2a717acd4db8fce69257f57c2
-
SHA256
78bccdfce650d1b0c3023ed1cf7174625e88af831865a926c927a320c1177e10
-
SHA512
cdf0c48be3ac5a5f8d15b6183abc3b6bfbc27c0dbf022bf3db4f9d85f33dc6ce3e71b990c75199d79bc4ee64dd782ce9f9ae73c6317e2f87ff789d33efea8438
-
SSDEEP
24576:/xrHjxsKK2jWSHw3mZZrbcF+tuGp3dA12LS1o2PjWlZn3j/x34:/tHGKJjZHw2ZZrbcF+tzbAMLYoNZ3j/e
Static task
static1
Behavioral task
behavioral1
Sample
Account-1579644703.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Account-1579644703.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Original.dll
Resource
win7-20240903-en
Malware Config
Extracted
http://194.36.191.30/45666.6096484954.dat
http://23.106.122.40/45666.6096484954.dat
http://94.140.112.52/45666.6096484954.dat
Extracted
http://194.36.191.30/45666.6096425926.dat
http://23.106.122.40/45666.6096425926.dat
http://94.140.112.52/45666.6096425926.dat
Extracted
qakbot
402.363
biden53
1634717752
103.142.10.177:443
24.152.219.253:995
181.118.183.94:443
129.208.147.188:995
24.119.214.7:443
38.70.253.226:2222
103.143.8.71:443
77.57.204.78:443
65.100.174.110:995
220.255.25.28:2222
91.178.126.51:995
37.210.155.239:995
81.241.252.59:2078
93.48.58.123:2222
65.100.174.110:443
76.25.142.196:443
24.231.209.2:2222
140.82.49.12:443
146.66.238.74:443
39.49.4.147:995
81.250.153.227:2222
89.101.97.139:443
41.86.42.158:995
187.75.66.160:995
69.30.186.190:0
94.200.181.154:443
120.150.218.241:995
72.173.78.211:443
216.201.162.158:443
24.231.209.2:6881
123.252.190.14:443
24.231.209.2:2083
86.220.112.26:2222
96.246.158.154:995
197.89.144.102:443
89.137.52.44:443
78.191.24.189:995
41.235.69.115:443
71.74.12.34:443
96.37.113.36:993
136.232.34.70:443
189.135.16.92:443
173.21.10.71:2222
67.165.206.193:993
75.188.35.168:443
187.149.227.40:443
73.151.236.31:443
181.4.53.6:465
189.146.41.71:443
108.4.67.252:443
100.1.119.41:443
189.175.198.162:80
109.12.111.14:443
201.137.10.225:443
86.8.177.143:443
68.204.7.158:443
209.210.95.228:443
24.139.72.117:443
24.55.112.61:443
24.229.150.54:995
45.46.53.140:2222
103.150.40.76:995
136.143.11.232:443
78.71.154.58:2222
47.151.185.131:443
2.222.167.138:443
78.71.167.243:2222
187.156.169.68:443
117.215.230.90:443
174.54.193.186:443
72.27.84.16:995
37.117.191.19:2222
39.52.224.154:995
188.54.167.41:443
196.207.140.40:995
49.206.29.127:443
37.208.181.198:443
105.198.236.99:995
109.249.181.70:995
103.133.200.139:443
98.203.26.168:443
199.27.127.129:443
208.78.220.143:443
50.194.160.233:32100
50.194.160.233:465
47.40.196.233:2222
86.152.43.219:443
201.111.144.72:443
2.237.74.121:2222
115.96.64.9:995
73.52.50.32:443
162.210.220.137:443
103.82.211.39:995
81.213.59.22:443
103.82.211.39:465
103.82.211.39:990
31.166.29.242:443
111.91.87.187:995
174.76.17.43:443
213.60.210.85:443
39.33.163.183:995
167.248.117.81:443
41.228.22.180:443
116.193.136.10:443
122.179.158.212:443
103.148.120.144:443
182.176.180.73:443
103.82.211.39:993
63.143.92.99:995
117.202.161.73:2222
65.100.174.110:8443
65.100.174.110:6881
69.30.186.190:443
190.117.91.214:443
72.252.201.69:995
39.40.37.70:32100
187.172.17.193:443
80.6.192.58:443
27.223.92.142:995
68.186.192.69:443
122.60.71.201:995
173.22.178.66:443
2.221.12.60:443
201.68.60.118:995
50.194.160.233:995
65.100.174.110:32103
123.201.44.86:6881
177.76.251.27:995
67.230.44.194:443
109.200.192.84:443
73.230.205.91:443
189.252.201.83:32101
136.232.254.46:443
95.159.33.115:995
115.96.62.113:443
85.60.147.26:2078
75.131.217.182:443
85.60.147.26:2222
129.35.116.77:990
68.117.229.117:443
83.110.201.195:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Targets
-
-
Target
Account-1579644703.xls
-
Size
534KB
-
MD5
65a32f108d3c8a6cc8d7813b9892a952
-
SHA1
58f1ec7f794a717acfef21f2e1718a80e76d41c5
-
SHA256
6410cdf429baab84d583828623814316317029059eb46d8eab9a755bf234c612
-
SHA512
5a9e430794bee2f27dd376f98617a718702600d4ef1a069c16da895c0848c2d3b5372ebf9a7fe5dec5a32427503433bef52bd42349a0b65b995175d80054b84a
-
SSDEEP
12288:+z7yduBV3IpMiw44f6Mw4ntMe5AofygCuOqPLkH5:mMuBVfQMwe51HCuZPQ
Score10/10-
Process spawned unexpected child process
This typically indicates the parent process was compromised via an exploit or macro.
-
-
-
Target
Original.dll
-
Size
1.2MB
-
MD5
b010fb1ea0c950e9b14a331b0da5aac8
-
SHA1
243989dc10c90b77ed107cbc066d8cc162fe7ab4
-
SHA256
641d48fdf79d0513748ed7044275f35ed5fa27177e5427a38d143d1c3272c40b
-
SHA512
6b8376162d9a7c88903280895e4efa133b3bb0a930021e52a591cab9e20c15097056a2b5a260ba9f678bf8409f1deabd687f85852dcf337e46606e4657ccf3f8
-
SSDEEP
24576:RzVwOlR/8qI8ixvTyj2AVpIP97+xgbZTekrX:RzVjR/zI8ixyjzS97+xgbZTfrX
-
Qakbot family
-
Loads dropped DLL
-