General

  • Target

    1892-58-0x0000000000320000-0x000000000034A000-memory.dmp

  • Size

    168KB

  • MD5

    019b0370a23e206eab6bb13c7f7533fd

  • SHA1

    7db06ff0095bd081ad7b1871622a1d8e0872d3f6

  • SHA256

    aceb2b26d6814cf8a4381287d19883fd1110baae71bc8b573ad6a66c4e597340

  • SHA512

    417aa96699da02e1eb0eca41c65bc80bbffcbb3a8fd4cb5219ef069ccb593371e0daf196eaecd56672d070727ea3e796f9288b1d1a1c9705a7b97ddd576acd21

  • SSDEEP

    3072:u/Aai/g3Vf3UPXLquAeJzrHhdoTBf1yg4gO/ya/X1:Vi9kPXLqbeJXHjoTBNy/D/

Score
10/10

Malware Config

Extracted

Family

qakbot

Version

404.14

Botnet

BB05

Campaign

1667208499

C2

174.77.209.5:443

187.0.1.74:23795

24.206.27.39:443

1.156.220.169:30723

156.216.39.119:995

58.186.75.42:443

1.156.197.160:30467

187.1.1.190:4844

186.18.210.16:443

1.181.56.171:771

90.165.109.4:2222

187.0.1.186:39742

87.57.13.215:443

187.0.1.207:52344

227.26.3.227:1

98.207.190.55:443

187.0.1.197:7017

188.49.56.189:443

102.156.160.115:443

187.0.1.24:17751

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 1892-58-0x0000000000320000-0x000000000034A000-memory.dmp
    .dll windows x86


    Headers

    Sections