General

  • Target

    964-57-0x0000000001E20000-0x0000000001E42000-memory.dmp

  • Size

    136KB

  • MD5

    ac31ead58e8d3885e403c3862227eb98

  • SHA1

    4dc65c6c5ba23d9880e07dde72078ddabf82d095

  • SHA256

    ca353249a1cd426a6c9d2572ba447c1362d8f8126f59dce700092fa325b2b32d

  • SHA512

    ccbb324c10889bc338d094f63ca4ad520b0aa96dd72e0670af656cd1ae8c5fe30095df669950168355f50c453fc7c707bb687eb8bf2600b4605710c58effbe83

  • SSDEEP

    3072:rF3VWov6SG+MTGzJcHo1AhsO2HJ0r1HBTBfA/RMh:hVWovtG+MTGSIGulJk1HBTBY/E

Malware Config

Extracted

Family

qakbot

Version

403.780

Botnet

obama200

Campaign

1657548298

C2

172.115.177.204:2222

89.101.97.139:443

186.90.153.162:2222

38.70.253.226:2222

120.150.218.241:995

72.252.157.93:995

72.252.157.93:993

94.36.193.176:2222

47.23.89.60:993

89.211.209.234:2222

76.25.142.196:443

46.100.25.239:61202

24.158.23.166:995

69.14.172.24:443

92.132.132.81:2222

37.34.253.233:443

93.48.80.198:995

174.80.15.101:2083

24.178.196.158:2222

197.89.20.137:443

Attributes
  • salt

    jHxastDcds)oMc=jvh7wdUhxcsdt2

Signatures

Files

  • 964-57-0x0000000001E20000-0x0000000001E42000-memory.dmp
    .dll windows x86


    Headers

    Sections