General

  • Target

    4936-136-0x00000000041D0000-0x00000000041F9000-memory.dmp

  • Size

    164KB

  • MD5

    473df34b838011e1b9171ededb928f94

  • SHA1

    98ca2b10e758144c8672369b4ee8627f9b3b026e

  • SHA256

    d031180911c806edca27ac85af675d35cfb6051c7d9122ab767891008bae210b

  • SHA512

    cdbd6ebf878ad94bb61f887689e194bb30f2be399734926fec08e65c53295e833d539fffadfb71b465c0c38bb5697fea49afd79cdd5017c97a06e7e904fb9262

  • SSDEEP

    3072:ek6qpghvq5cpA9A20DJLSNGArTBfBBy3vO/ya:N6qqhvqUAe20DJ+NGArTBZA32/

Score
10/10

Malware Config

Extracted

Family

qakbot

Version

403.1051

Botnet

BB04

Campaign

1666690935

C2

181.164.194.228:443

24.116.45.121:443

190.74.248.136:443

24.206.27.39:443

27.110.134.202:995

2.88.206.121:443

71.199.168.185:443

200.233.108.153:995

198.2.51.242:993

172.117.139.142:995

70.115.104.126:443

144.202.15.58:443

190.24.45.24:995

24.9.220.167:443

58.247.115.126:995

193.3.19.137:443

45.230.169.132:995

68.62.199.70:443

43.241.159.238:443

113.162.196.232:443

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 4936-136-0x00000000041D0000-0x00000000041F9000-memory.dmp
    .dll windows x86


    Headers

    Sections