General

  • Target

    1048-58-0x0000000000190000-0x00000000001BA000-memory.dmp

  • Size

    168KB

  • MD5

    6606fdc5d286bc64ca1dd0c9805b7d07

  • SHA1

    f143d63c790dba1f551245a2f736c5f6b4cc75aa

  • SHA256

    bec5f66c0b99ee11939cfa2f6553a2086f116e7f5b60cee35ad462c15cce5eda

  • SHA512

    324e4a1f45d126161e8a041121e511651e125628c29f38e2e21b2990dea37edd61fde75745c7673d18c03258206e61750edfe5e2d45dd0f43ab6bbeda3eb44ba

  • SSDEEP

    3072:4/TZYYhyttWYT3CYGdA0JwM1jwTBfJzgMCO/yaxX1:6AOY3CYG+0J31jwTBBzjd/

Malware Config

Extracted

Family

qakbot

Version

404.14

Botnet

obama220

Campaign

1667373670

C2

174.0.224.214:443

1.70.60.142:54792

74.33.84.227:443

1.175.205.2:13825

187.1.1.45:12681

190.24.45.24:995

1.50.68.204:18177

193.3.19.137:443

1.41.44.11:58115

73.165.119.20:443

58.247.115.126:995

1.84.35.26:3587

216.82.134.218:443

1.181.164.194:58369

187.1.1.74:23795

71.199.168.185:443

1.94.49.5:29697

187.0.1.108:11471

186.73.140.43:443

1.97.119.214:59649

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 1048-58-0x0000000000190000-0x00000000001BA000-memory.dmp
    .dll windows x86


    Headers

    Sections