Behavioral task
behavioral1
Sample
1148-57-0x00000000001D0000-0x00000000001FA000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1148-57-0x00000000001D0000-0x00000000001FA000-memory.dll
Resource
win10v2004-20220901-en
General
-
Target
1148-57-0x00000000001D0000-0x00000000001FA000-memory.dmp
-
Size
168KB
-
MD5
2faec524cf5565d8257341326398bc08
-
SHA1
e5c8429b4966c9fb295fe379abe4ee225ffc319f
-
SHA256
ce0acefe5b9586da40a6f913c4ae5f0abc7c2b8c18584bea76e8722d6dfb73f4
-
SHA512
69d2c59ce6731edb6a052b5677d9ee667c58215afe2469ea4ba2ffac19b189e5276cb67143465ac077074f4e9d5f72af80a4d193f9627ff299bb8e6d7bc56322
-
SSDEEP
3072:m42R1+j+XyOz+A2C+Q1AmJNblpATBfpyva832CO/yaHk:xj2/ajC+QGmJRlpATBhR832d/s
Malware Config
Extracted
qakbot
404.30
BB06
1668670510
86.225.214.138:2222
71.183.236.133:443
182.66.197.35:443
70.66.199.12:443
76.80.180.154:995
180.151.104.143:443
92.149.205.238:2222
83.110.223.247:443
183.87.31.34:443
105.103.50.1:990
103.141.50.117:995
105.103.50.1:465
105.103.50.1:22
86.130.9.167:2222
86.99.15.243:2222
90.104.22.28:2222
172.117.139.142:995
176.142.207.63:443
142.161.27.232:2222
71.247.10.63:50003
108.6.249.139:443
184.176.154.83:995
47.34.30.133:443
71.247.10.63:995
92.207.132.174:2222
89.129.109.27:2222
197.148.17.17:2078
105.111.45.51:995
12.172.173.82:21
87.202.101.164:50000
184.153.132.82:443
74.66.134.24:443
24.64.114.59:3389
73.155.10.79:443
136.232.184.134:995
105.184.161.242:443
2.14.241.33:2222
72.82.136.90:443
73.36.196.11:443
82.31.37.241:443
24.116.45.121:443
213.67.255.57:2222
90.221.5.105:443
66.191.69.18:995
175.205.2.54:443
64.121.161.102:443
41.35.196.18:995
73.230.28.7:443
176.151.15.101:443
24.64.114.59:2222
85.59.61.52:2222
157.231.42.190:443
27.110.134.202:995
49.175.72.56:443
12.172.173.82:2087
12.172.173.82:22
50.68.204.71:995
213.91.235.146:443
174.77.209.5:443
117.186.222.30:993
76.127.192.23:443
50.68.204.71:443
109.11.175.42:2222
199.83.165.233:443
45.248.169.101:443
174.0.224.214:443
151.30.53.233:443
12.172.173.82:443
181.118.183.116:443
174.45.15.123:443
77.126.81.208:443
92.106.70.62:2222
82.121.73.56:2222
173.239.94.212:443
187.199.224.16:32103
183.82.100.110:2222
190.100.149.122:995
41.62.227.225:443
75.99.125.238:2222
2.84.98.228:2222
188.24.223.55:443
79.37.204.67:443
24.228.132.224:2222
69.119.123.159:2222
47.176.30.75:443
174.104.184.149:443
58.247.115.126:995
12.172.173.82:993
102.157.69.217:995
186.52.227.51:995
98.147.155.235:443
173.32.181.236:443
172.90.139.138:2222
75.143.236.149:443
75.98.154.19:443
74.92.243.113:50000
12.172.173.82:995
58.186.75.42:443
105.103.50.1:32103
121.122.99.151:995
12.172.173.82:50001
24.49.232.96:443
85.74.158.150:2222
75.156.125.215:995
68.47.128.161:443
71.31.101.183:443
75.191.246.70:443
80.0.74.165:443
87.65.160.87:995
70.64.77.115:443
81.229.117.95:2222
47.41.154.250:443
174.60.47.98:443
186.88.53.160:2222
84.143.91.238:443
47.185.141.97:443
69.133.162.35:443
84.35.26.14:995
74.33.84.227:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
Files
-
1148-57-0x00000000001D0000-0x00000000001FA000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ