General

  • Target

    1976-58-0x0000000000220000-0x000000000024A000-memory.dmp

  • Size

    168KB

  • MD5

    4c6df8279a8a055039ced711f30ea0d7

  • SHA1

    99f72f55a51da6b54d39b4cfcdebd1fca701ae3c

  • SHA256

    39fa3f6ec5c4357bb87750b6cde48755286a6b24ca33a202573fbe6e49aff9a9

  • SHA512

    6e9efe33ccb5ea70e69de62718f13dfc3f6c5aad4e1e5a11b829b4a8c4a9e362e8a63bbca99d9ef7d540b531ffe1fcdbe07e20b8e01a50fdc008143c2a082641

  • SSDEEP

    3072:5xgQb34wT1P0N3bIWaAnJNJndLTBf1lgGoO/yaz:weqN3bIWPnJnndLTBtl5r/b

Score
10/10

Malware Config

Extracted

Family

qakbot

Version

404.20

Botnet

BB05

Campaign

1667294768

C2

136.232.184.134:995

1.65.20.175:53249

187.0.1.154:63263

50.68.204.71:995

74.92.243.113:50000

1.149.126.159:57345

187.0.1.182:17093

123.3.240.16:995

76.68.34.167:2222

172.219.147.156:3389

94.49.5.116:443

187.0.1.181:14507

206.1.223.234:2087

187.0.1.186:18828

131.23.1.187:1

23.233.254.195:443

76.125.91.160:443

187.0.1.90:42349

70.51.139.148:2222

187.0.1.76:47526

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 1976-58-0x0000000000220000-0x000000000024A000-memory.dmp
    .dll windows x86


    Headers

    Sections