General

  • Target

    900-57-0x00000000023E0000-0x000000000246F000-memory.dmp

  • Size

    572KB

  • MD5

    92a5da9c70fa6a4174ecca6755a30382

  • SHA1

    e512063383fba5d654cd4b2933f5b9f7494f42ba

  • SHA256

    ae860db9a4c545ae42aa50b0913092d791602e8f36ce70fd82d45901cca0554a

  • SHA512

    c37b1cb41c01200ba15497d4edd8c7c6465d11ff5718385a5c431b40ccf8cc340da695faaf8a715bb44a561609672ab9f9e28c01e5b19e34a00153d0a0154d7b

  • SSDEEP

    12288:/2q3UPYgtm7MM+4clV18DIuFjALSNubTqO/WNRM3QeBZ:/2wF7MfruNBqTqO/8I

Score
10/10

Malware Config

Extracted

Family

qakbot

Version

403.573

Botnet

AA

Campaign

1649273304

C2

83.110.75.97:2222

47.23.89.62:993

187.207.48.194:61202

45.63.1.12:995

140.82.63.183:995

45.76.167.26:995

140.82.63.183:443

144.202.2.175:995

144.202.3.39:443

149.28.238.199:443

144.202.3.39:995

45.63.1.12:443

149.28.238.199:995

45.76.167.26:443

144.202.2.175:443

100.1.108.246:443

32.221.224.140:995

24.55.67.176:443

31.35.28.29:443

70.51.134.168:2222

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

Files

  • 900-57-0x00000000023E0000-0x000000000246F000-memory.dmp
    .dll windows x86


    Headers

    Sections