Behavioral task
behavioral1
Sample
1456-57-0x0000000000310000-0x000000000033A000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1456-57-0x0000000000310000-0x000000000033A000-memory.dll
Resource
win10v2004-20220812-en
General
-
Target
1456-57-0x0000000000310000-0x000000000033A000-memory.dmp
-
Size
168KB
-
MD5
9d024a21afb415c529b8812c2ff6184f
-
SHA1
16dc4e4ff05c516533a49e1f3923c42972a0c914
-
SHA256
7eebc2344d0b047dd77853f835a1aa35b1fca3e0d728306ba21fda59dc264ac4
-
SHA512
7aee607a4e4dc3602256644f94ce58613fbaffc68de7025e7b43dc53a89dfae7d9ee8ad5bd9d50a317a9be6ec035a85d571a2f1f82ee3c345a237c3a3e13fc2c
-
SSDEEP
3072:yxwvwKdT3JSNdWmbaY9AxJmG1D7TTBfJsgWEO/yan:6E3Y+mbaYexJT1D7TTBBsxv/f
Malware Config
Extracted
qakbot
404.20
BB05
1667543522
190.199.161.250:993
139.216.164.122:443
187.1.1.50:9621
24.142.218.202:443
187.1.1.174:25967
80.0.74.165:443
1.92.239.222:45313
86.225.214.138:2222
1.45.49.137:20481
201.102.237.203:443
187.0.1.84:53556
105.184.161.175:443
187.0.1.41:59046
154.247.15.173:995
1.154.247.15:44413
67.10.175.47:2222
187.1.1.73:42359
75.156.125.215:995
1.50.68.204:18179
75.99.125.238:2222
1.190.36.189:39432
24.64.114.59:2222
24.64.114.59:3389
151.237.76.117:443
187.1.1.151:7733
173.238.202.233:443
187.0.1.173:8373
58.186.75.42:443
1.206.1.199:17672
174.58.146.57:443
1.190.74.248:34817
187.1.1.190:51979
86.157.12.148:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
Files
-
1456-57-0x0000000000310000-0x000000000033A000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ