DllInstall
DllRegisterServer
Behavioral task
behavioral1
Sample
ba2e03fe89956b865d3c26827fda3f3cc4dc5c8c2d1d82a4577f221535ebeb4d.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
ba2e03fe89956b865d3c26827fda3f3cc4dc5c8c2d1d82a4577f221535ebeb4d.dll
Resource
win10v2004-20220812-en
Target
ba2e03fe89956b865d3c26827fda3f3cc4dc5c8c2d1d82a4577f221535ebeb4d.dll
Size
126KB
MD5
635c509a10fd873a42ee259fd68622ab
SHA1
e199490483b3ec7aaa3ab82b229bf12dc0551893
SHA256
ba2e03fe89956b865d3c26827fda3f3cc4dc5c8c2d1d82a4577f221535ebeb4d
SHA512
9e42ec0db89e3eebbe93fcc3fca2b39bc293efde1f7bc2e18bb643b87e29461274fb1a3ce78be2b61edb6eff8d798f8411ffa7abb517ad4995d523ed5d3eae10
SSDEEP
3072:iXwi3p+Ph6v7Y3l8HAhJsmt03RTBfNqYLC:9i3p+Pwv7YyghJ9tgRTBlqYO
qakbot
403.895
BB
1663774884
70.49.33.200:2222
181.118.183.123:443
99.232.140.205:2222
31.54.39.153:2078
173.218.180.91:443
193.3.19.37:443
134.35.8.88:443
41.97.152.42:443
70.51.132.197:2222
41.111.74.35:995
189.19.189.222:32101
105.156.139.150:443
217.165.68.59:993
119.82.111.158:443
111.125.157.230:443
125.25.129.70:443
197.94.84.128:443
177.255.14.99:995
187.205.222.100:443
190.44.40.48:995
139.228.33.176:2222
191.97.234.238:995
66.181.164.43:443
88.245.168.200:2222
110.4.255.247:443
89.211.217.38:995
109.155.5.164:993
76.169.76.44:2222
72.88.245.71:443
197.204.243.167:443
68.53.110.74:995
41.69.103.179:995
68.224.229.42:443
100.1.5.250:995
194.166.205.204:995
88.232.207.24:443
14.183.63.12:443
89.211.223.138:2222
85.98.206.165:995
191.254.74.89:32101
72.66.96.129:995
176.42.245.2:995
186.154.92.181:443
88.231.221.198:995
102.38.97.229:995
45.51.148.111:993
87.243.113.104:995
84.38.133.191:443
123.240.131.1:443
191.84.204.214:995
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
memchr
_strtoi64
_errno
_snprintf
qsort
_vsnprintf
memset
_time64
_vsnwprintf
malloc
strncpy
strchr
strtod
localeconv
_ftol2_sse
free
atol
memcpy
FindNextFileW
GetTickCount
GetModuleHandleA
GetWindowsDirectoryW
GetCurrentDirectoryW
CreateMutexW
DuplicateHandle
GetCurrentThread
lstrcmpA
GetLastError
lstrcatA
CreateDirectoryW
DisconnectNamedPipe
lstrcpynW
GetProcessId
lstrcatW
lstrcpyW
GetOEMCP
GetFileAttributesW
lstrcmpiW
GetDriveTypeW
K32GetModuleFileNameExW
MoveFileW
lstrcpynA
lstrlenW
GetCurrentProcessId
SwitchToThread
GetModuleHandleW
GetProcAddress
HeapCreate
HeapFree
HeapAlloc
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryA
FreeLibrary
lstrcmpiA
GetSystemTimeAsFileTime
SetThreadPriority
GetExitCodeProcess
FindFirstFileW
GetSystemInfo
SetFileAttributesW
LocalAlloc
FlushFileBuffers
LoadLibraryW
GetCommandLineW
GetVersionExA
GetIconInfo
CopyIcon
GetDC
CharUpperBuffA
CharUpperBuffW
RegisterClassExA
UnregisterClassA
CreateWindowExA
DestroyWindow
DefWindowProcW
DrawIconEx
GetCursorInfo
SelectObject
GetObjectW
BitBlt
CreateCompatibleBitmap
DeleteObject
CreateCompatibleDC
GetDIBits
GetDeviceCaps
DeleteDC
CommandLineToArgvW
CoSetProxyBlanket
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
VariantClear
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayDestroy
SysFreeString
SysAllocString
SafeArrayGetLBound
DllInstall
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ