Behavioral task
behavioral1
Sample
1944-57-0x0000000001CA0000-0x0000000001CCA000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1944-57-0x0000000001CA0000-0x0000000001CCA000-memory.dll
Resource
win10v2004-20220812-en
General
-
Target
1944-57-0x0000000001CA0000-0x0000000001CCA000-memory.dmp
-
Size
168KB
-
MD5
723f56b08c160c2676558e4860db9245
-
SHA1
d69ba9736e8c9edce0c94767c6573a987a9f18e0
-
SHA256
dd9ceaf99f8509c81e7fbe85afdd6c7ae32afff13c97e438037572bd61dc3e32
-
SHA512
2b0672b4ea2e4e7b64d5f5b36c7db60d32ae8857f2098af5ff6e60671de6ff325738fe7154e8a23e46943f80781f76148383e38bf6d90db3e1538fd88c6605d4
-
SSDEEP
3072:4x0v7RFFbIhx4Knsg7A1JQ49uXTBfleguEO/yan:f7NkQKnsgs1JL9uXTBdeJv/f
Malware Config
Extracted
qakbot
404.20
BB05
1667543522
190.199.161.250:993
92.25.139.40:443
157.231.42.190:995
186.73.140.43:443
70.66.199.12:443
216.82.134.218:443
174.77.209.5:443
139.216.164.122:443
91.169.12.198:32100
139.5.239.14:443
50.37.149.215:443
74.92.243.113:995
74.92.243.113:50000
49.175.72.56:443
24.142.218.202:443
136.232.184.134:995
181.118.183.103:443
174.101.111.4:443
47.34.30.133:443
41.44.11.227:995
89.216.114.179:443
80.0.74.165:443
92.239.222.177:443
94.60.141.48:995
64.207.237.118:443
72.53.103.56:443
174.104.184.149:443
203.217.65.6:443
86.225.214.138:2222
45.49.137.80:443
76.68.34.167:2222
92.24.200.226:995
144.202.15.58:443
74.33.84.227:443
201.102.237.203:443
41.96.68.5:443
73.29.92.128:443
84.209.52.11:443
50.68.204.71:443
58.247.115.126:995
201.192.179.221:443
105.184.161.175:443
212.251.122.147:995
2.103.22.24:443
41.230.166.34:995
65.25.116.200:443
99.254.117.30:443
184.153.132.82:443
154.247.15.173:995
154.247.15.173:32103
154.247.15.173:993
193.3.19.137:443
142.115.159.36:2222
190.18.236.175:443
91.138.17.202:443
67.10.175.47:2222
84.113.121.103:443
157.231.42.190:443
73.165.119.20:443
190.24.45.24:995
187.199.171.252:32103
73.36.196.11:443
75.156.125.215:995
50.68.204.71:993
36.152.128.7:2078
24.69.87.61:443
58.162.223.233:443
94.63.65.146:443
75.99.125.238:2222
190.36.189.154:2222
50.68.204.71:995
24.4.239.157:443
174.0.224.214:443
24.206.27.39:443
136.244.25.165:443
24.64.114.59:2222
90.104.22.28:2222
84.35.26.14:995
197.204.243.188:443
175.205.2.54:443
184.162.156.115:2222
190.79.133.56:2222
24.64.114.59:3389
75.98.154.19:443
85.61.165.153:2222
200.233.108.153:995
70.181.149.227:443
85.59.61.52:2222
70.64.77.115:443
151.237.76.117:443
72.80.249.39:995
190.29.228.61:443
151.30.53.233:443
46.229.194.17:443
73.60.227.230:443
75.141.227.169:443
173.238.202.233:443
50.86.217.209:443
98.145.23.67:443
173.32.181.236:443
87.220.68.51:2222
187.135.153.221:2222
190.204.83.110:2222
58.186.75.42:443
206.1.199.69:2087
190.27.77.14:995
46.190.93.247:50000
91.165.188.74:50000
94.49.5.116:443
110.23.76.9:2222
174.58.146.57:443
190.74.248.136:443
73.88.173.113:443
190.203.11.218:443
24.232.88.41:443
27.33.237.105:443
173.209.185.159:443
86.157.12.148:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
Files
-
1944-57-0x0000000001CA0000-0x0000000001CCA000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ