DllRegisterServer
Static task
static1
Behavioral task
behavioral1
Sample
1f634bbaf8d3b629a0c247c8d885f3da2323f447247914afe7d99ac4813b7e94.dll
Resource
win7-20220311-en
Behavioral task
behavioral2
Sample
1f634bbaf8d3b629a0c247c8d885f3da2323f447247914afe7d99ac4813b7e94.dll
Resource
win10v2004-en-20220113
General
-
Target
1f634bbaf8d3b629a0c247c8d885f3da2323f447247914afe7d99ac4813b7e94
-
Size
197KB
-
MD5
c72ae60648941e0812ff80ca8ec010a0
-
SHA1
977a8ba095724cdc15e5d427c9084fd8956359f3
-
SHA256
1f634bbaf8d3b629a0c247c8d885f3da2323f447247914afe7d99ac4813b7e94
-
SHA512
19a635be1a9d5a8a19d0d2c0b8c57c4b4dde6f9bf2698f91719df4061be560dcbca2c2b27fbabd2ca32efc5fc3bdd7a7392da6d4f19c86074cab24fa7afbcadc
Malware Config
Extracted
qakbot
401.147
tr02s
1608638923
41.230.209.182:443
35.134.202.234:443
73.166.10.38:50010
172.87.157.235:3389
24.216.56.6:443
184.179.14.130:22
24.152.219.253:995
67.209.195.198:443
86.98.89.36:2222
47.146.169.85:443
197.135.60.192:443
90.201.21.58:443
81.214.126.173:2222
37.116.152.122:2078
64.225.166.16:2222
187.7.236.197:995
47.196.192.184:443
82.12.157.95:995
2.50.161.6:2222
83.110.213.49:443
174.87.65.179:443
174.104.31.209:443
50.244.112.106:443
77.81.155.184:465
45.118.216.157:443
79.129.252.62:2222
98.190.24.81:443
68.225.60.77:995
189.62.175.92:22
94.26.116.31:443
68.13.99.24:443
71.74.12.34:443
94.59.225.49:995
71.117.132.169:443
154.238.248.20:995
217.165.3.30:443
65.30.213.13:6882
78.101.130.59:995
45.250.69.150:443
81.97.154.100:443
45.63.107.192:995
149.28.99.97:443
149.28.99.97:995
79.129.121.81:995
196.151.252.84:443
103.92.113.14:443
81.133.234.36:2222
125.209.114.180:995
108.46.145.30:443
105.198.236.101:443
213.60.147.140:443
86.237.20.57:2222
87.218.53.48:2222
83.110.236.232:443
185.163.221.77:2222
172.116.85.178:443
106.51.85.162:443
185.246.9.69:995
217.54.46.64:995
108.190.194.146:2222
24.62.176.9:443
72.186.1.237:443
156.222.43.196:995
96.19.117.140:443
75.136.40.155:443
41.239.134.34:993
144.139.47.206:443
85.132.36.111:2222
89.136.39.108:443
187.155.59.73:443
74.75.237.11:443
83.110.13.182:2222
105.184.50.206:443
109.177.63.245:2078
151.61.125.180:2222
197.82.221.199:443
151.73.121.136:443
71.187.170.235:443
90.175.186.38:2222
87.27.110.90:2222
106.250.150.98:443
197.45.110.165:995
80.11.210.247:443
216.201.162.158:443
92.154.83.96:2078
109.116.214.124:443
86.236.77.68:2222
5.15.109.245:443
62.38.114.12:2222
90.53.100.20:2222
41.205.16.106:443
94.53.92.42:443
193.248.154.174:2222
120.150.218.241:995
59.99.36.85:443
72.28.255.159:995
117.215.199.8:443
77.136.217.50:995
31.215.98.110:443
149.28.101.90:8443
197.90.144.75:32100
74.73.27.35:443
207.246.77.75:2222
86.98.21.136:443
45.32.211.207:995
45.77.115.208:2222
37.104.39.32:995
14.137.64.132:995
2.50.167.241:443
70.126.76.75:443
85.72.255.119:2222
178.223.22.192:995
217.128.117.218:2222
2.7.69.217:2222
86.163.174.88:2222
201.127.79.186:2222
24.201.61.153:2078
2.89.8.135:443
188.25.61.41:443
98.118.156.172:443
202.141.244.118:993
90.65.236.181:2222
94.52.68.72:443
73.166.10.38:2222
86.124.93.144:443
216.215.77.18:2078
80.106.85.24:2222
98.16.204.189:995
83.202.68.220:2222
116.240.78.45:995
90.188.91.57:995
120.57.76.109:443
39.32.140.166:995
90.101.62.189:2222
190.72.211.89:2222
207.246.77.75:995
45.77.115.208:8443
95.77.144.238:443
45.77.115.208:443
45.32.211.207:8443
24.218.181.15:443
2.49.130.241:2078
67.141.11.98:443
86.121.43.200:443
37.182.244.124:2222
141.237.22.157:2222
184.189.122.72:443
77.27.174.49:995
2.88.184.160:443
86.126.220.127:443
Signatures
-
Qakbot 1 IoCs
Processes:
resource yara_rule sample Qakbot -
Qakbot family
Files
-
1f634bbaf8d3b629a0c247c8d885f3da2323f447247914afe7d99ac4813b7e94.dll regsvr32 windows x86
580fdcdfbd7c2c8aaa198476c811fa88
Code Sign
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
inet_ntoa
psapi
GetModuleFileNameExW
msvcrt
_time64
strtod
_HUGE
localeconv
strchr
strncpy
malloc
free
qsort
memcpy
memmove
memset
atol
_vsnwprintf
_snprintf
_vsnprintf
_strtoi64
memchr
_errno
kernel32
lstrcmpA
lstrlenA
lstrcpynA
GetCurrentProcess
GetCurrentThread
MultiByteToWideChar
GetExitCodeThread
GetOEMCP
CreateMutexA
DuplicateHandle
GetCurrentProcessId
GetLastError
lstrcatA
CreateDirectoryW
DisconnectNamedPipe
lstrcpynW
GetProcessId
CopyFileW
lstrcatW
DeleteFileW
lstrcpyW
lstrcmpiW
GetDriveTypeW
GetModuleHandleA
lstrlenW
MoveFileW
GetProcAddress
SwitchToThread
InterlockedIncrement
SetThreadPriority
HeapAlloc
HeapFree
HeapCreate
WideCharToMultiByte
FreeLibrary
GetSystemTimeAsFileTime
SetLastError
lstrcmpiA
LoadLibraryA
GetExitCodeProcess
CreatePipe
GetWindowsDirectoryW
FindFirstFileW
FindNextFileW
SetFileAttributesW
FlushFileBuffers
LocalAlloc
LoadLibraryW
GetTickCount
GetModuleFileNameW
GetSystemInfo
GetVersionExA
user32
CreateWindowExA
CharUpperBuffW
CharUpperBuffA
GetSystemMetrics
RegisterClassExA
DestroyWindow
DefWindowProcA
UnregisterClassA
advapi32
GetSidSubAuthority
OpenProcessToken
RegSetValueExW
RegQueryValueExW
IsTextUnicode
RegDeleteValueA
RegOpenKeyExW
RegEnumValueW
RegDeleteValueW
RegQueryInfoKeyW
RegUnLoadKeyW
RegLoadKeyW
ConvertSidToStringSidW
OpenThreadToken
GetSidSubAuthorityCount
GetTokenInformation
LookupAccountNameW
LookupAccountSidW
GetSecurityDescriptorSacl
SetSecurityInfo
ConvertStringSecurityDescriptorToSecurityDescriptorW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
ole32
CoInitializeEx
CoInitializeSecurity
CoCreateInstance
CoSetProxyBlanket
oleaut32
SafeArrayGetUBound
SysAllocString
SysFreeString
SafeArrayGetElement
SafeArrayDestroy
VariantClear
SafeArrayGetLBound
userenv
GetUserProfileDirectoryW
Exports
Exports
Sections
.text Size: 141KB - Virtual size: 144KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 38KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ