General

  • Target

    1088-57-0x0000000001EA0000-0x0000000001EC2000-memory.dmp

  • Size

    136KB

  • MD5

    00382964c6ea1fe7bcdf01175b21b06c

  • SHA1

    4d301a18bfeaa0c726e76377fa721c0f4092fe27

  • SHA256

    45e9371b885344f2cea2934fba5dfd8026667789842350b7ed8fe2f888a1217a

  • SHA512

    2d7671508f87fef256025c3fcb8163849c014ecb99626b75e4a333d66c75c8593bd1173049698a14e5bcfa6f632674db304283c96ffd69cc21de22a83d52ded9

  • SSDEEP

    3072:7d9GAGkiyV0ukSbpSgNA+lJMjl7BTBfwXRMh:HGA3l+ukSbO+lJUl7BTBoXE

Malware Config

Extracted

Family

qakbot

Version

403.780

Botnet

obama200

Campaign

1657548298

C2

172.115.177.204:2222

89.101.97.139:443

186.90.153.162:2222

38.70.253.226:2222

120.150.218.241:995

72.252.157.93:995

72.252.157.93:993

94.36.193.176:2222

47.23.89.60:993

89.211.209.234:2222

76.25.142.196:443

46.100.25.239:61202

24.158.23.166:995

69.14.172.24:443

92.132.132.81:2222

37.34.253.233:443

93.48.80.198:995

174.80.15.101:2083

24.178.196.158:2222

197.89.20.137:443

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

Files

  • 1088-57-0x0000000001EA0000-0x0000000001EC2000-memory.dmp
    .dll windows x86


    Headers

    Sections