Behavioral task
behavioral1
Sample
1160-58-0x00000000001C0000-0x00000000001EA000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1160-58-0x00000000001C0000-0x00000000001EA000-memory.dll
Resource
win10v2004-20220901-en
General
-
Target
1160-58-0x00000000001C0000-0x00000000001EA000-memory.dmp
-
Size
168KB
-
MD5
b2b4d8a58d90e67ec82b5178784c3475
-
SHA1
c660c5d8dd7c91c2a9c6ff91e8586972a31278b8
-
SHA256
f30c116fe8f7b0a0c9eb0058e93b535fab02fdd8783caac10447bddeb29f83d3
-
SHA512
fb19dab8535b7d4d2bfdb38208a4e92c79debdf62df2d1798e4e55d7a1039f4674a172bb38b2251ce30fe066a5f7fe47978f28656d95f335f285959d2851ed54
-
SSDEEP
3072:RxcSLq6Rtb0g4fV/F4A/JDfrgnTBf5LgqHO/yaj:Q2m3fV/Fd/JzrgnTBRLFu/b
Malware Config
Extracted
qakbot
404.20
BB05
1667470564
181.118.183.103:443
187.0.1.73:57336
41.44.11.227:995
1.66.180.227:43528
187.0.1.190:19192
174.0.224.214:443
1.175.205.2:13825
109.159.119.162:2222
45.49.137.80:443
1.92.24.200:57859
149.126.159.224:443
1.91.68.227:56065
82.141.152.214:443
212.251.122.147:995
92.185.204.18:2078
1.172.249.99:36616
187.1.1.190:6189
80.0.74.165:443
209.0.1.81:40739
197.204.182.47:443
92.90.101.167:443
187.1.1.91:43276
74.92.243.113:50000
1.200.233.108:39171
94.49.5.116:443
1.49.175.72:14337
87.99.116.47:443
187.0.1.84:53556
201.245.250.192:995
187.1.1.186:4818
64.123.103.123:443
187.0.1.87:56388
87.218.114.203:2222
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
Files
-
1160-58-0x00000000001C0000-0x00000000001EA000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ