General

  • Target

    1452-58-0x00000000007A0000-0x00000000007C9000-memory.dmp

  • Size

    164KB

  • MD5

    ca32705b84ea02350f866663e78727d6

  • SHA1

    3995077e416acd5d85ea20e2b20774b61d575e52

  • SHA256

    da84c86f99aa22fb33431a7d9e73c6f5961b6b1cfb975d0604cc77f787932577

  • SHA512

    aff8a76a7e3f1d1bfcae3f5259b2b841b7a2ac56247299c4ede8ee52b1f058425681c7e756918c1816b5ccd05cad0ab5c8668efbfb5c51b23895abb8b1a9a564

  • SSDEEP

    3072:B/zcLEurDOISyqA3JEFniTTBflCyHDO/ya:Rzc4urDL/3JqniTTB9dHy/

Score
10/10

Malware Config

Extracted

Family

qakbot

Version

403.1051

Botnet

BB04

Campaign

1666776460

C2

197.204.53.242:443

83.244.63.21:443

27.110.134.202:995

173.49.74.62:443

181.164.194.228:443

24.116.45.121:443

41.47.249.185:443

24.206.27.39:443

113.183.223.8:443

186.188.80.134:443

64.207.237.118:443

156.216.134.70:995

58.247.115.126:995

180.151.116.67:443

41.140.63.187:443

144.202.15.58:443

190.199.97.108:993

172.117.139.142:995

45.230.169.132:995

24.9.220.167:443

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 1452-58-0x00000000007A0000-0x00000000007C9000-memory.dmp
    .dll windows x86


    Headers

    Sections