General

  • Target

    4868-139-0x0000000001120000-0x0000000001149000-memory.dmp

  • Size

    164KB

  • MD5

    aa73b3e0c768a127285d555ba93bb1ff

  • SHA1

    dfa32e5c864bb366b5152ef6136fd81d6d7a8ac2

  • SHA256

    6d62ead53af5bfa1600219aca6891a9f14a6b680c8b40b8e16cec166b776a6f5

  • SHA512

    4c4baa47a464896bd8ea6a96391a386f38a8109f217fe7692116620df32998e3de179df052413b7d9cb27bdd960b0f5bee5ff1092b34c85d33f055b8120ef7f6

  • SSDEEP

    3072:ojXbOSNJ6/EDxLE1ZaazAZjJ5aBR9S3TBfl/yXLO/ya:KNJ6clLEh0ZjJsBR9S3TB9aXa/

Score
10/10

Malware Config

Extracted

Family

qakbot

Version

403.1051

Botnet

BB04

Campaign

1666690935

C2

181.164.194.228:443

24.116.45.121:443

190.74.248.136:443

24.206.27.39:443

27.110.134.202:995

2.88.206.121:443

71.199.168.185:443

200.233.108.153:995

198.2.51.242:993

172.117.139.142:995

70.115.104.126:443

144.202.15.58:443

190.24.45.24:995

24.9.220.167:443

58.247.115.126:995

193.3.19.137:443

45.230.169.132:995

68.62.199.70:443

43.241.159.238:443

113.162.196.232:443

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 4868-139-0x0000000001120000-0x0000000001149000-memory.dmp
    .dll windows x86


    Headers

    Sections