Behavioral task
behavioral1
Sample
1892-58-0x0000000000320000-0x000000000034A000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1892-58-0x0000000000320000-0x000000000034A000-memory.dll
Resource
win10v2004-20220812-en
General
-
Target
1892-58-0x0000000000320000-0x000000000034A000-memory.dmp
-
Size
168KB
-
MD5
019b0370a23e206eab6bb13c7f7533fd
-
SHA1
7db06ff0095bd081ad7b1871622a1d8e0872d3f6
-
SHA256
aceb2b26d6814cf8a4381287d19883fd1110baae71bc8b573ad6a66c4e597340
-
SHA512
417aa96699da02e1eb0eca41c65bc80bbffcbb3a8fd4cb5219ef069ccb593371e0daf196eaecd56672d070727ea3e796f9288b1d1a1c9705a7b97ddd576acd21
-
SSDEEP
3072:u/Aai/g3Vf3UPXLquAeJzrHhdoTBf1yg4gO/ya/X1:Vi9kPXLqbeJXHjoTBNy/D/
Malware Config
Extracted
qakbot
404.14
BB05
1667208499
174.77.209.5:443
187.0.1.74:23795
24.206.27.39:443
1.156.220.169:30723
156.216.39.119:995
58.186.75.42:443
1.156.197.160:30467
187.1.1.190:4844
186.18.210.16:443
1.181.56.171:771
90.165.109.4:2222
187.0.1.186:39742
87.57.13.215:443
187.0.1.207:52344
227.26.3.227:1
98.207.190.55:443
187.0.1.197:7017
188.49.56.189:443
102.156.160.115:443
187.0.1.24:17751
70.51.139.148:2222
187.0.1.109:34115
14.164.18.210:443
187.0.1.97:30597
205.161.22.189:443
187.0.1.151:54711
196.217.63.248:443
187.0.1.160:45243
66.37.239.222:443
24.207.97.40:443
187.0.1.59:24056
68.62.199.70:443
45.230.169.132:993
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
Files
-
1892-58-0x0000000000320000-0x000000000034A000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ