General

  • Target

    2032-58-0x0000000000360000-0x000000000038A000-memory.dmp

  • Size

    168KB

  • MD5

    b0240dd09f0f1f523175eb193c8fdaa5

  • SHA1

    985360bd3bdeef5183ab82a22e7531e26be6c490

  • SHA256

    ab62aed500fffa522d141029c3cb8f9c8fd6da0a56dbac92906b8496532cd169

  • SHA512

    044236df8ae4f1a6afc8cc66e9201c5efe7cb60e1751b00c2b3abd671a3e173acacc68205b93d5e7b6c599ef86fe5f843ca3536924cfac4f385aa67038d20b19

  • SSDEEP

    3072:e/kmtUDsrl/0jfn+qAuJPX31YTBfNuggtO/yaxX1:kE6Kjfn+/uJf31YTBFuf8/

Malware Config

Extracted

Family

qakbot

Version

404.14

Botnet

obama220

Campaign

1667373670

C2

174.0.224.214:443

1.70.60.142:54792

74.33.84.227:443

1.175.205.2:13825

187.1.1.45:12681

190.24.45.24:995

1.50.68.204:18177

193.3.19.137:443

1.41.44.11:58115

73.165.119.20:443

58.247.115.126:995

1.84.35.26:3587

216.82.134.218:443

1.181.164.194:58369

187.1.1.74:23795

71.199.168.185:443

1.94.49.5:29697

187.0.1.108:11471

186.73.140.43:443

1.97.119.214:59649

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 2032-58-0x0000000000360000-0x000000000038A000-memory.dmp
    .dll windows x86


    Headers

    Sections