Behavioral task
behavioral1
Sample
1440-60-0x00000000002B0000-0x00000000002DA000-memory.dll
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1440-60-0x00000000002B0000-0x00000000002DA000-memory.dll
Resource
win10v2004-20221111-en
General
-
Target
1440-60-0x00000000002B0000-0x00000000002DA000-memory.dmp
-
Size
168KB
-
MD5
afdd454deaf0640d48aeb81d2f8d7fcc
-
SHA1
1c2f72c26385b55226cc7d4c6c5ec0499f775487
-
SHA256
aba0f16af88d89db1021534aabb56b7204dea7098017b18aa8d84f8a44314f9a
-
SHA512
94be5da99fa8cf939ffed4bb8a48abd80d0748325623c62d99fb2625c063ce12d56ba633faef11a9d8c0b9f36bcf704280a62ecdc1c7948d66dc50ca8206266a
-
SSDEEP
3072:+4efO2Q0mqJt62NvmMQ2sKzAuJbFtMcTBflkva83U5O/ya:3VYtfNex2sK0uJhtMcTB9v83UQ/
Malware Config
Extracted
qakbot
404.30
BB06
1668683197
23.240.47.58:995
12.172.173.82:465
91.169.12.198:32100
94.63.65.146:443
80.13.179.151:2222
64.207.237.118:443
24.206.27.39:443
83.114.60.6:2222
86.171.75.63:443
86.195.32.149:2222
170.253.25.35:443
92.185.204.18:2078
157.231.42.190:995
170.249.59.153:443
174.101.111.4:443
116.74.163.152:443
76.80.180.154:995
180.151.104.143:443
86.130.9.167:2222
86.99.15.243:2222
90.104.22.28:2222
172.117.139.142:995
103.141.50.117:995
176.142.207.63:443
71.183.236.133:443
131.106.168.223:443
190.75.110.239:443
70.66.199.12:443
183.87.31.34:443
83.110.223.247:443
47.34.30.133:443
71.247.10.63:995
92.207.132.174:2222
89.129.109.27:2222
12.172.173.82:21
87.202.101.164:50000
2.99.47.198:2222
154.247.95.119:2078
197.148.17.17:2078
37.14.229.220:2222
78.247.21.20:443
112.141.184.246:995
142.161.27.232:2222
71.247.10.63:50003
108.6.249.139:443
92.239.81.124:443
184.176.154.83:995
184.153.132.82:443
74.66.134.24:443
24.64.114.59:3389
105.184.161.242:443
73.36.196.11:443
82.31.37.241:443
24.116.45.121:443
213.67.255.57:2222
200.93.14.206:2222
91.254.215.167:443
87.220.205.14:2222
92.27.86.48:2222
73.230.28.7:443
176.151.15.101:443
24.64.114.59:2222
86.165.15.180:2222
66.191.69.18:995
175.205.2.54:443
64.121.161.102:443
87.99.116.47:443
180.156.240.239:995
12.172.173.82:22
50.68.204.71:995
213.91.235.146:443
174.77.209.5:443
76.127.192.23:443
50.68.204.71:443
109.11.175.42:2222
199.83.165.233:443
91.68.227.219:443
45.248.169.101:443
85.59.61.52:2222
85.139.176.42:2222
82.34.170.37:443
157.231.42.190:443
76.20.42.45:443
27.110.134.202:995
89.115.196.99:443
83.11.84.105:2222
12.172.173.82:2087
12.172.173.82:443
181.118.183.116:443
174.45.15.123:443
77.126.81.208:443
92.106.70.62:2222
82.121.73.56:2222
173.239.94.212:443
187.199.224.16:32103
183.82.100.110:2222
186.188.2.193:443
41.62.227.225:443
75.99.125.238:2222
2.84.98.228:2222
82.121.237.106:2222
100.6.8.7:443
85.241.180.94:443
79.37.204.67:443
217.128.91.196:2222
58.247.115.126:995
12.172.173.82:993
98.147.155.235:443
102.157.69.217:995
212.251.122.147:995
92.137.74.174:2222
24.228.132.224:2222
69.119.123.159:2222
89.79.229.50:443
47.176.30.75:443
174.104.184.149:443
173.32.181.236:443
74.92.243.113:50000
12.172.173.82:995
58.186.75.42:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
Files
-
1440-60-0x00000000002B0000-0x00000000002DA000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ