Windows Analysis Report 2663823750648860.dll
Overview
General Information
Detection
Qbot
Score: | 92 |
Range: | 0 - 100 |
Whitelisted: | false |
Confidence: | 100% |
Signatures
Found malware configuration
Yara detected Qbot
Multi AV Scanner detection for submitted file
Maps a DLL or memory area into another process
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
Writes to foreign memory regions
Allocates memory in foreign processes
Injects code into the Windows Explorer (explorer.exe)
Sigma detected: Suspicious Call by Ordinal
Contains functionality to detect sleep reduction / modifications
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
One or more processes crash
Contains functionality to query locales information (e.g. system language)
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Found potential string decryption / allocating functions
Sample execution stops while process was sleeping (likely an evasion)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to call native functions
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to dynamically determine API calls
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
AV process strings found (often used to terminate AV products)
PE file does not import any functions
PE file contains an invalid checksum
Extensive use of GetProcAddress (often used to hide API calls)
PE file contains strange resources
Drops PE files
Checks if the current process is being debugged
PE / OLE file has an invalid certificate
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to detect sandboxes (mouse cursor move detection)
PE file overlay found
May check if the current machine is a sandbox (GetTickCount - Sleep)
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Classification
|
{
"Bot id": "obama151",
"Campaign": "1640597238",
"Version": "403.2",
"C2 list": [
"70.163.1.219:443",
"93.48.80.198:995",
"72.252.201.34:993",
"24.95.61.62:443",
"31.35.28.29:443",
"69.14.172.24:443",
"86.97.9.221:443",
"83.110.91.18:2222",
"31.215.215.152:2222",
"24.178.196.158:2222",
"74.15.2.252:2222",
"217.165.123.47:61200",
"41.228.22.180:443",
"105.198.236.99:995",
"109.12.111.14:443",
"149.135.101.20:443",
"96.80.109.57:995",
"38.70.253.226:2222",
"24.222.20.254:443",
"5.32.41.46:443",
"190.73.3.148:2222",
"120.150.218.241:995",
"176.67.56.94:443",
"96.21.251.127:2222",
"128.106.122.39:443",
"83.110.2.118:443",
"31.215.215.152:1194",
"117.248.109.38:21",
"103.142.10.177:443",
"217.164.247.241:2222",
"94.62.161.77:995",
"182.56.69.176:443",
"180.233.150.134:995",
"71.74.12.34:443",
"103.139.242.30:990",
"194.36.28.238:443",
"106.51.48.170:50001",
"75.156.151.34:443",
"103.143.8.71:6881",
"140.82.49.12:443",
"32.221.229.7:443",
"39.49.115.85:995",
"37.210.226.125:61202",
"45.9.20.200:2211",
"59.6.7.83:61200",
"176.205.194.245:2078",
"149.200.165.116:443",
"114.79.148.170:443",
"144.86.10.42:443",
"94.200.181.154:995",
"96.37.113.36:993",
"89.137.52.44:443",
"121.175.104.13:32100",
"136.232.34.70:443",
"79.167.192.206:995",
"73.151.236.31:443",
"218.253.234.82:2222",
"78.180.66.163:995",
"76.25.142.196:443",
"67.209.195.198:443",
"78.100.225.202:2222",
"83.110.219.9:32101",
"94.60.254.81:443",
"182.191.92.203:995",
"173.21.10.71:2222",
"80.14.196.176:2222",
"67.165.206.193:993",
"23.233.146.92:443",
"1.253.96.148:443",
"88.253.171.236:995",
"75.188.35.168:443",
"76.169.147.192:32103",
"72.66.116.235:995",
"31.215.70.105:443",
"176.205.209.183:2222",
"91.73.77.234:995",
"130.255.238.245:61202",
"176.205.194.245:2222",
"197.202.51.179:443",
"218.101.110.3:995",
"178.153.86.181:443",
"136.143.11.232:443",
"78.100.225.202:443",
"74.5.148.57:443",
"5.193.122.139:2222",
"24.152.219.253:995",
"89.165.55.237:443",
"103.139.242.30:993",
"114.143.36.16:61202",
"86.150.101.200:443",
"50.237.134.22:995",
"103.139.242.30:995",
"86.144.217.66:443",
"190.45.79.111:443",
"72.252.201.34:995",
"119.246.201.210:443",
"148.69.189.146:443",
"103.139.242.30:22",
"114.38.161.124:995",
"189.224.99.142:995",
"70.51.153.90:2222",
"89.101.97.139:443",
"217.128.93.27:2222",
"209.210.95.228:32100",
"100.1.119.41:443",
"201.172.31.95:80",
"31.215.215.152:2222",
"157.47.55.245:443",
"24.55.112.61:443",
"24.53.49.240:443",
"190.39.205.165:443",
"63.153.148.32:443",
"82.152.39.39:443",
"186.64.87.236:443",
"31.219.154.176:32101",
"102.65.38.67:443",
"217.165.21.84:995",
"96.80.109.57:995",
"40.134.247.125:995",
"83.199.144.45:2222",
"92.154.9.41:50002",
"111.125.245.116:995",
"182.176.180.73:443",
"121.175.104.13:443",
"65.100.174.110:8443",
"79.160.207.214:443",
"70.224.68.92:443",
"173.25.166.81:443",
"176.205.152.44:443",
"108.4.67.252:443",
"189.174.46.65:995",
"187.189.86.168:443",
"176.24.150.197:443",
"200.54.14.34:80",
"103.139.242.30:443",
"103.139.242.30:465",
"103.139.242.30:993",
"73.5.119.219:443",
"68.186.192.69:443",
"50.33.112.74:995",
"70.93.80.154:995",
"75.169.58.229:32100",
"63.143.92.99:995",
"46.9.77.245:995",
"173.71.147.134:995",
"75.110.250.187:443",
"65.100.174.110:443",
"65.100.174.110:443",
"82.78.212.133:443",
"83.110.107.123:443"
]
}
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Qbot_1 | Yara detected Qbot | Joe Security | ||
JoeSecurity_Qbot_1 | Yara detected Qbot | Joe Security | ||
JoeSecurity_Qbot_1 | Yara detected Qbot | Joe Security | ||
JoeSecurity_Qbot_1 | Yara detected Qbot | Joe Security | ||
JoeSecurity_Qbot_1 | Yara detected Qbot | Joe Security | ||
Click to see the 11 entries |
Source | Rule | Description | Author | Strings |
---|---|---|---|---|
JoeSecurity_Qbot_1 | Yara detected Qbot | Joe Security | ||
JoeSecurity_Qbot_1 | Yara detected Qbot | Joe Security | ||
JoeSecurity_Qbot_1 | Yara detected Qbot | Joe Security | ||
JoeSecurity_Qbot_1 | Yara detected Qbot | Joe Security | ||
JoeSecurity_Qbot_1 | Yara detected Qbot | Joe Security | ||
Click to see the 27 entries |
Sigma Overview |
---|
System Summary: |
---|
Sigma detected: Suspicious Call by Ordinal |
Source: | Author: Florian Roth: |
Jbx Signature Overview |
---|
Click to jump to signature section
Show All Signature Results
AV Detection: |
---|
Found malware configuration |
Source: | Malware Configuration Extractor: |