Behavioral task
behavioral1
Sample
916-57-0x0000000000AD0000-0x0000000000AFA000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
916-57-0x0000000000AD0000-0x0000000000AFA000-memory.dll
Resource
win10v2004-20220901-en
General
-
Target
916-57-0x0000000000AD0000-0x0000000000AFA000-memory.dmp
-
Size
168KB
-
MD5
179be88405db306b365964acf56b01fd
-
SHA1
cecf0eba35ea441e58825775336a7ba52997c1ed
-
SHA256
0a1dc5772d98ac01b72ef470a27da837b91c59dadea580d28989d919dfc9b34e
-
SHA512
2291e16d9db0ce3f58b162168759442402acf8d8e69d47463bac4c043979344e619df94bc0878c8f4f5980b2531ac51d676a72dd0298a806fefbab8295f23ef7
-
SSDEEP
3072:h/Xk0Q8NYgQ9Fu8/uVZAEJswlwgTBfpfg8QO/yaUX1:/Q+8/uVyEJPlwgTBhfrz/
Malware Config
Extracted
qakbot
404.14
obama219
1667198792
84.35.26.14:995
24.206.27.39:443
1.175.205.2:13825
187.1.1.58:63347
144.202.15.58:443
1.156.216.39:30467
186.18.210.16:443
1.181.56.171:771
187.1.1.112:36280
206.1.251.127:2087
187.0.1.167:15088
190.207.196.66:2222
187.0.1.41:25933
102.156.43.188:443
187.0.1.93:40032
156.220.245.93:993
187.1.1.188:12600
189.148.124.243:2222
24.69.87.61:443
187.0.1.78:45959
85.241.180.94:443
45.35.97.45:443
187.0.1.27:27923
41.250.136.196:443
187.0.1.72:22773
92.185.204.18:2078
75.166.39.70:443
187.0.1.24:2524
24.207.97.40:443
187.0.1.59:24056
68.62.199.70:443
45.230.169.132:993
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
Files
-
916-57-0x0000000000AD0000-0x0000000000AFA000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ