DllInstall
DllRegisterServer
Behavioral task
behavioral1
Sample
43c7c8f02be4221e412d480f7177a4667cc7ce92a59180404e6e4b45093c004b.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
43c7c8f02be4221e412d480f7177a4667cc7ce92a59180404e6e4b45093c004b.dll
Resource
win10v2004-20220812-en
Target
43c7c8f02be4221e412d480f7177a4667cc7ce92a59180404e6e4b45093c004b.dll
Size
157KB
MD5
d12783d7327a75110712223da96c3f30
SHA1
b7554df0fce128471ca384172d9e7763f015c769
SHA256
43c7c8f02be4221e412d480f7177a4667cc7ce92a59180404e6e4b45093c004b
SHA512
89af15b927cbb5f1aa27580ff7b3762672bef45d6d6faad177fd45d2ff6b1b84da5f6fb8d992b6366888a41d150a7dfcc134f4f61a2fcffe725938df5c347379
SSDEEP
3072:pVdZx1yoZPH5A5JKczWQTBfpJ/6Y8O/ya:zdZLyoZvS5JZzWQTBhJ/PH/
qakbot
403.973
obama214
1666019778
105.96.221.136:443
37.37.80.2:3389
105.154.56.232:995
41.107.116.19:443
105.103.52.189:443
159.192.204.135:443
41.107.58.251:443
177.152.65.142:443
102.47.218.41:443
176.45.35.243:443
70.173.248.13:443
102.159.77.134:995
220.123.29.76:443
82.12.196.197:443
103.156.237.71:443
149.126.159.254:443
176.44.119.153:443
181.56.171.3:995
190.205.229.67:2222
151.251.50.117:443
163.182.177.80:443
72.21.109.1:443
41.101.92.195:443
190.193.180.228:443
190.204.112.207:2222
41.97.56.102:443
41.69.209.76:443
190.78.89.157:993
206.1.216.19:2087
85.242.200.96:443
41.251.219.50:443
105.111.141.73:443
41.103.64.82:443
190.39.218.17:443
84.220.13.28:443
190.100.149.122:995
197.1.19.60:443
196.64.70.216:443
196.89.213.40:995
181.168.145.94:443
187.101.200.186:995
41.105.245.174:443
179.25.144.177:995
78.179.135.247:443
94.52.127.44:443
186.18.210.16:443
102.158.215.180:443
78.183.238.79:443
197.1.50.150:443
42.189.32.186:80
167.58.235.5:443
14.54.83.15:443
187.198.8.241:443
71.239.12.136:443
112.70.141.221:443
37.245.136.135:2222
88.232.10.69:443
41.98.250.65:443
82.205.9.34:443
196.64.239.75:443
37.8.68.1:443
197.1.248.244:443
197.2.139.7:443
79.45.134.162:22
182.183.211.163:995
154.246.14.94:443
144.86.17.168:443
182.185.29.69:995
160.177.47.116:6881
181.197.41.173:443
160.248.194.147:443
85.109.221.97:443
125.25.77.249:995
1.20.185.138:443
91.171.72.214:32100
197.10.195.7:443
45.160.33.163:443
202.170.206.61:995
96.9.66.118:995
132.251.244.227:443
113.188.13.246:443
78.181.39.116:443
1.53.101.75:443
197.202.173.111:443
31.201.40.194:443
197.116.178.224:443
79.155.159.177:443
181.188.164.123:443
156.221.50.226:995
41.251.15.7:990
45.240.140.233:995
102.188.91.158:995
189.243.187.76:443
179.105.182.216:995
196.65.230.248:995
181.141.3.126:443
128.234.26.174:995
78.161.194.147:443
78.101.177.210:443
86.217.167.235:2222
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
memchr
_strtoi64
_errno
_snprintf
qsort
_vsnprintf
memset
_time64
_vsnwprintf
malloc
strncpy
strchr
strtod
localeconv
_ftol2_sse
free
atol
memcpy
FindNextFileW
GetTickCount
GetModuleHandleA
GetWindowsDirectoryW
GetCurrentDirectoryW
CreateMutexW
DuplicateHandle
GetCurrentThread
lstrcmpA
GetLastError
lstrcatA
GetLocaleInfoA
CreateDirectoryW
DisconnectNamedPipe
lstrcpynW
GetProcessId
lstrcatW
lstrcpyW
GetFileAttributesW
lstrcmpiW
GetDriveTypeW
K32GetModuleFileNameExW
MoveFileW
lstrcpynA
lstrlenW
GetCurrentProcessId
SwitchToThread
GetModuleHandleW
GetProcAddress
HeapCreate
HeapFree
HeapAlloc
MultiByteToWideChar
WideCharToMultiByte
LoadLibraryA
FreeLibrary
lstrcmpiA
GetSystemTimeAsFileTime
SetThreadPriority
GetExitCodeProcess
FindFirstFileW
GetSystemInfo
SetFileAttributesW
LocalAlloc
FlushFileBuffers
LoadLibraryW
GetCommandLineW
GetVersionExA
GetIconInfo
CopyIcon
GetDC
CharUpperBuffA
CharUpperBuffW
RegisterClassExA
UnregisterClassA
CreateWindowExA
DestroyWindow
DefWindowProcW
DrawIconEx
GetCursorInfo
SelectObject
GetObjectW
BitBlt
CreateCompatibleBitmap
DeleteObject
CreateCompatibleDC
GetDIBits
GetDeviceCaps
DeleteDC
CommandLineToArgvW
CoSetProxyBlanket
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
VariantClear
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayDestroy
SysFreeString
SysAllocString
SafeArrayGetLBound
DllInstall
DllRegisterServer
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ