General

  • Target

    1944-57-0x0000000001CA0000-0x0000000001CCA000-memory.dmp

  • Size

    168KB

  • MD5

    723f56b08c160c2676558e4860db9245

  • SHA1

    d69ba9736e8c9edce0c94767c6573a987a9f18e0

  • SHA256

    dd9ceaf99f8509c81e7fbe85afdd6c7ae32afff13c97e438037572bd61dc3e32

  • SHA512

    2b0672b4ea2e4e7b64d5f5b36c7db60d32ae8857f2098af5ff6e60671de6ff325738fe7154e8a23e46943f80781f76148383e38bf6d90db3e1538fd88c6605d4

  • SSDEEP

    3072:4x0v7RFFbIhx4Knsg7A1JQ49uXTBfleguEO/yan:f7NkQKnsgs1JL9uXTBdeJv/f

Score
10/10

Malware Config

Extracted

Family

qakbot

Version

404.20

Botnet

BB05

Campaign

1667543522

C2

190.199.161.250:993

92.25.139.40:443

157.231.42.190:995

186.73.140.43:443

70.66.199.12:443

216.82.134.218:443

174.77.209.5:443

139.216.164.122:443

91.169.12.198:32100

139.5.239.14:443

50.37.149.215:443

74.92.243.113:995

74.92.243.113:50000

49.175.72.56:443

24.142.218.202:443

136.232.184.134:995

181.118.183.103:443

174.101.111.4:443

47.34.30.133:443

41.44.11.227:995

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 1944-57-0x0000000001CA0000-0x0000000001CCA000-memory.dmp
    .dll windows x86


    Headers

    Sections