General

  • Target

    1380-136-0x0000000000EC0000-0x0000000000EE9000-memory.dmp

  • Size

    164KB

  • MD5

    c80a97686fbcf4a76a88b936321800f4

  • SHA1

    f2f662b6ad1d58697983519e35770adaf795a16c

  • SHA256

    fda29495d68d8510115e7321087f44598d30ef54d887dbe6adbe9d10e3eb81d1

  • SHA512

    0ea84cd65e0d6cc307812ef0c6ff75e66e69a4bf15beb85d58b85b0fe945448bfb08af2aaa31a6050191c4256fda1b7e6687a398ba441b5b7abf287ff87ccb26

  • SSDEEP

    3072:HTZwEUH11CWIAXJyDLeNHTBf5wyX4O/ya:zZ1UH17NXJ6LuHTBRPX7/

Score
10/10

Malware Config

Extracted

Family

qakbot

Version

403.1051

Botnet

BB04

Campaign

1666690935

C2

181.164.194.228:443

24.116.45.121:443

190.74.248.136:443

24.206.27.39:443

27.110.134.202:995

2.88.206.121:443

71.199.168.185:443

200.233.108.153:995

198.2.51.242:993

172.117.139.142:995

70.115.104.126:443

144.202.15.58:443

190.24.45.24:995

24.9.220.167:443

58.247.115.126:995

193.3.19.137:443

45.230.169.132:995

68.62.199.70:443

43.241.159.238:443

113.162.196.232:443

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 1380-136-0x0000000000EC0000-0x0000000000EE9000-memory.dmp
    .dll windows x86


    Headers

    Sections