Behavioral task
behavioral1
Sample
1156-57-0x0000000000960000-0x0000000000989000-memory.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1156-57-0x0000000000960000-0x0000000000989000-memory.dll
Resource
win10v2004-20220812-en
General
-
Target
1156-57-0x0000000000960000-0x0000000000989000-memory.dmp
-
Size
164KB
-
MD5
9ac535b69dfae8ca4070e1ca042a624e
-
SHA1
219f4175e34ef153e7906f9e591905d73576ab6a
-
SHA256
2ec70f8d4caefec8796d69803e74d4445403f7aa54e4dc44f67efa99992b22a2
-
SHA512
9a6bfa09640b2a389b41e841df9ecb310e322186e686774050b6ea1c31b3cefb8a887baab9ed9465a45af226794c6d3043788dca45218890f3b6b2d163627bc4
-
SSDEEP
3072:D04kE+4YVJmcz7KXnCwrmAoJwiXNETBftSrMQO/yaY/fT:M4YDTzmXCoDoJhXNETBFSrMz/g/
Malware Config
Extracted
qakbot
404.2
obama218
1666870886
24.206.27.39:443
1.102.156.146:8707
187.1.1.118:44751
172.117.139.142:995
1.181.118.183:31745
45.35.97.45:443
187.0.1.27:28294
58.247.115.126:995
1.24.9.220:42753
187.1.1.186:48208
112.141.184.246:995
201.223.169.238:32100
68.62.199.70:443
45.49.137.80:443
187.0.1.172:28709
102.159.236.29:443
183.242.1.187:1
186.48.161.130:995
191.33.187.192:2222
154.181.228.27:995
90.165.109.4:2222
187.0.1.24:53089
41.97.205.96:443
187.0.1.160:45207
91.171.72.214:32100
187.0.1.181:11298
24.177.111.153:443
184.159.76.47:443
187.0.1.105:39831
93.156.96.171:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
Files
-
1156-57-0x0000000000960000-0x0000000000989000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ