General

  • Target

    1124-58-0x00000000001E0000-0x000000000020A000-memory.dmp

  • Size

    168KB

  • MD5

    6fd06e9a5097349ac9f8e064977a62a0

  • SHA1

    02aee064bd24f2cbe8deac67c7cf05c2209a194b

  • SHA256

    d14bc02d29f14e78d6c6d9872b1b7ed8c5a7214ea4ed15f478a63734a123325e

  • SHA512

    1bcc65ecb271aec52f4514bbfd5e8b4dd386b88aa5f44cb364a578f257c3e9d21c220f2176f178b9fed8630efc5de44cdd8a6a6f93f272b5940a978604ba330b

  • SSDEEP

    3072:3+/MOaL0DVvEmWfPIPiA+JXv3CITBfN2gwTO/yaxX1:35aaLfPIPn+J/3CITBF2/C/

Malware Config

Extracted

Family

qakbot

Version

404.14

Botnet

obama220

Campaign

1667373670

C2

174.0.224.214:443

1.70.60.142:54792

74.33.84.227:443

1.175.205.2:13825

187.1.1.45:12681

190.24.45.24:995

1.50.68.204:18177

193.3.19.137:443

1.41.44.11:58115

73.165.119.20:443

58.247.115.126:995

1.84.35.26:3587

216.82.134.218:443

1.181.164.194:58369

187.1.1.74:23795

71.199.168.185:443

1.94.49.5:29697

187.0.1.108:11471

186.73.140.43:443

1.97.119.214:59649

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 1124-58-0x00000000001E0000-0x000000000020A000-memory.dmp
    .dll windows x86


    Headers

    Sections