General

  • Target

    1440-60-0x00000000002B0000-0x00000000002DA000-memory.dmp

  • Size

    168KB

  • MD5

    afdd454deaf0640d48aeb81d2f8d7fcc

  • SHA1

    1c2f72c26385b55226cc7d4c6c5ec0499f775487

  • SHA256

    aba0f16af88d89db1021534aabb56b7204dea7098017b18aa8d84f8a44314f9a

  • SHA512

    94be5da99fa8cf939ffed4bb8a48abd80d0748325623c62d99fb2625c063ce12d56ba633faef11a9d8c0b9f36bcf704280a62ecdc1c7948d66dc50ca8206266a

  • SSDEEP

    3072:+4efO2Q0mqJt62NvmMQ2sKzAuJbFtMcTBflkva83U5O/ya:3VYtfNex2sK0uJhtMcTB9v83UQ/

Score
10/10

Malware Config

Extracted

Family

qakbot

Version

404.30

Botnet

BB06

Campaign

1668683197

C2

23.240.47.58:995

12.172.173.82:465

91.169.12.198:32100

94.63.65.146:443

80.13.179.151:2222

64.207.237.118:443

24.206.27.39:443

83.114.60.6:2222

86.171.75.63:443

86.195.32.149:2222

170.253.25.35:443

92.185.204.18:2078

157.231.42.190:995

170.249.59.153:443

174.101.111.4:443

116.74.163.152:443

76.80.180.154:995

180.151.104.143:443

86.130.9.167:2222

86.99.15.243:2222

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 1440-60-0x00000000002B0000-0x00000000002DA000-memory.dmp
    .dll windows x86


    Headers

    Sections