Behavioral task
behavioral1
Sample
912-57-0x0000000000300000-0x0000000000329000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
912-57-0x0000000000300000-0x0000000000329000-memory.dll
Resource
win10v2004-20220812-en
General
-
Target
912-57-0x0000000000300000-0x0000000000329000-memory.dmp
-
Size
164KB
-
MD5
228c6bb7b4eaa26f743227aa124e97ca
-
SHA1
2e5c8cc821d6447b40104a37bf0edf6abee25931
-
SHA256
67a5cfea41c6f44a30605852a2792a4113dead1de9b2fd2496ef0d13aaa1e363
-
SHA512
b02e7e8820e80de66fdaa8a682e95bc2aec14884cd01342d1759c45472004a92c492bfa09e29aa1d2fda7d6b1fb1001b9a1489f621f96ce96ead60dbc2664af9
-
SSDEEP
3072:zcLUd5RV86uoZPHZA5Jq8TiwTBfpp/6YgO/ya:Igd5rruoZvy5J5TiwTBBp/PD/
Malware Config
Extracted
qakbot
403.973
obama213
1665998932
70.173.248.13:443
219.71.108.177:443
206.1.189.186:443
14.246.151.175:443
102.159.77.134:995
200.233.108.153:993
134.35.3.85:443
190.199.186.117:2222
200.155.61.245:995
103.156.237.71:443
176.44.119.153:443
181.56.171.3:995
151.251.50.117:443
163.182.177.80:443
104.202.220.123:443
41.101.92.195:443
190.193.180.228:443
190.204.112.207:2222
41.97.56.102:443
41.69.209.76:443
94.36.5.31:443
190.78.89.157:993
206.1.216.19:2087
85.242.200.96:443
41.251.219.50:443
105.111.141.73:443
41.103.64.82:443
154.246.158.189:443
190.39.218.17:443
84.220.13.28:443
190.100.149.122:995
197.1.19.60:443
196.64.70.216:443
41.107.10.21:443
197.205.161.20:443
102.47.218.41:443
196.89.213.40:995
181.168.145.94:443
187.101.200.186:995
41.105.245.174:443
179.25.144.177:995
78.179.135.247:443
94.52.127.44:443
186.18.210.16:443
207.204.120.40:443
102.158.215.180:443
190.74.4.20:443
188.49.164.208:443
190.26.159.133:995
78.183.238.79:443
197.1.50.150:443
42.189.32.186:80
167.58.235.5:443
14.54.83.15:443
187.198.8.241:443
71.239.12.136:443
112.70.141.221:443
37.245.136.135:2222
88.232.10.69:443
41.98.250.65:443
82.205.9.34:443
196.64.239.75:443
37.8.68.1:443
197.1.248.244:443
197.2.139.7:443
79.45.134.162:22
182.183.211.163:995
72.88.245.71:443
154.246.14.94:443
41.248.155.126:995
200.233.108.153:995
144.86.17.168:443
182.185.29.69:995
160.177.47.116:6881
181.197.41.173:443
160.248.194.147:443
85.109.221.97:443
101.109.135.60:995
1.20.185.138:443
91.171.72.214:32100
197.10.195.7:443
45.160.33.163:443
202.170.206.61:995
96.9.66.118:995
132.251.244.227:443
113.188.13.246:443
78.181.39.116:443
1.53.101.75:443
197.202.173.111:443
31.201.40.194:443
105.105.224.133:443
79.155.159.177:443
181.188.164.123:443
156.221.50.226:995
41.251.15.7:990
177.205.74.14:2222
45.240.140.233:995
102.188.91.158:995
189.243.187.76:443
179.105.182.216:995
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
Files
-
912-57-0x0000000000300000-0x0000000000329000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 95KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ