General

  • Target

    1932-56-0x00000000004C0000-0x00000000004E2000-memory.dmp

  • Size

    136KB

  • MD5

    e3e11ae09fa3f0fe6fc51973ad5b8daf

  • SHA1

    a264e4e554cd8c70eaf959b4c966722371ddf0b1

  • SHA256

    b037dde53be37ee79d37c1fac1a7b034c2c2f50e3980bbf27f6c329601e0ea99

  • SHA512

    eacfe07c51cd31a2f6aba115d8e1b30fa9a7804813b68070759eed9a01a559b7a530db68be2428c04db215a60079f8cc800c3d5520c715f3f43746c4102b9b2e

  • SSDEEP

    3072:CnA5OfBV060nFeSIcAmYJjBr5VTBfJroO:h5Ofn70nFu5mYJtr5VTBhroO

Malware Config

Extracted

Family

qakbot

Version

403.895

Botnet

obama207

Campaign

1664363417

C2

217.165.146.158:993

41.97.179.58:443

86.132.13.49:2078

197.203.50.195:443

85.245.143.94:443

86.196.181.62:2222

102.190.190.242:995

105.184.133.198:995

179.111.23.186:32101

179.251.119.206:995

84.3.85.30:443

39.44.5.104:995

197.41.235.69:995

193.3.19.137:443

186.81.122.168:443

103.173.121.17:443

41.104.80.233:443

102.189.184.12:995

156.199.90.139:443

14.168.180.223:443

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 1932-56-0x00000000004C0000-0x00000000004E2000-memory.dmp
    .dll windows x86


    Headers

    Sections