Behavioral task
behavioral1
Sample
1196-57-0x0000000000340000-0x0000000000369000-memory.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1196-57-0x0000000000340000-0x0000000000369000-memory.dll
Resource
win10v2004-20220812-en
General
-
Target
1196-57-0x0000000000340000-0x0000000000369000-memory.dmp
-
Size
164KB
-
MD5
67520bb0a35feacf7402d76a05b86c1b
-
SHA1
1ecaa31b90bafccb6bb9685fc6bc4f31c445e975
-
SHA256
554173b63a641238b31fc7a9bc22c970963d98e6afc82990871c3e3dc08c0de2
-
SHA512
e8d684404424b6bd8622d5c0c634c55bba646e6053b700ff623bbbb50eae178f743a08de8900b17d30467cc9891cb54a86145aeb37c2a0a99097576892b0eaf0
-
SSDEEP
3072:7YYJlVf1FGI1X3FARJm1eLVITBfpd/6oUO/ya:nJlVf/GI1n2RJMeLVITBBd/v//
Malware Config
Extracted
qakbot
403.973
BB02
1665761649
211.47.11.62:33850
104.233.202.195:443
105.156.242.71:443
45.230.169.132:995
181.197.41.173:443
197.0.89.147:443
191.254.53.134:995
190.204.74.4:2222
46.185.147.165:443
190.26.159.133:995
177.205.74.14:2222
197.63.250.197:993
45.230.169.132:443
156.212.50.148:443
193.27.13.28:32100
190.200.10.82:2222
31.166.182.166:443
179.105.182.216:995
193.201.187.64:443
1.53.101.75:443
190.181.17.58:443
181.141.3.126:443
125.26.193.137:995
58.186.91.228:443
113.170.223.42:443
139.228.33.176:2222
167.58.235.5:443
41.98.236.210:443
220.123.29.76:443
163.182.177.80:443
186.139.116.78:443
58.186.75.42:443
93.156.96.171:443
187.198.8.241:443
189.243.187.76:443
197.94.79.39:443
102.189.242.128:995
105.154.60.233:995
156.146.55.173:2222
109.177.128.182:443
125.20.84.122:443
186.18.210.16:443
41.105.150.238:443
187.58.165.81:443
183.182.86.158:443
42.189.32.186:80
110.159.63.62:443
41.111.66.163:443
190.193.180.228:443
42.115.244.80:443
187.56.91.215:995
179.25.153.200:995
190.100.149.122:995
181.44.34.172:443
196.207.146.151:443
105.197.208.168:995
72.88.245.71:443
197.204.233.216:443
85.171.48.85:443
144.202.15.58:443
144.202.15.58:995
105.69.142.130:995
41.109.62.192:443
197.158.89.85:443
187.37.47.42:995
186.15.213.14:443
187.101.200.186:995
41.101.129.54:443
186.0.51.202:443
191.165.254.63:2222
181.30.225.9:443
41.141.239.223:995
102.187.59.86:995
41.230.147.223:443
181.128.21.133:443
102.158.17.105:443
105.108.80.229:443
41.107.209.163:443
196.235.137.166:443
148.213.109.165:995
186.86.212.138:443
118.216.99.232:443
41.99.208.154:443
23.225.104.250:443
186.18.77.99:443
186.188.96.197:443
41.96.120.232:443
105.108.189.56:443
79.100.58.254:443
180.65.194.65:443
196.65.255.151:995
156.174.26.63:443
85.110.133.32:443
41.101.200.226:443
45.227.251.167:2222
96.234.66.76:995
39.44.5.102:995
41.109.253.237:443
181.164.194.228:443
41.200.165.185:443
105.159.124.224:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
Files
-
1196-57-0x0000000000340000-0x0000000000369000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ