Behavioral task
behavioral1
Sample
1944-58-0x0000000000230000-0x000000000025A000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
1944-58-0x0000000000230000-0x000000000025A000-memory.dll
Resource
win10v2004-20220812-en
General
-
Target
1944-58-0x0000000000230000-0x000000000025A000-memory.dmp
-
Size
168KB
-
MD5
3fc455fca17b55ccf7d5f38fdf1dc76f
-
SHA1
a78c3ce5c50f9925dda76170b18d99a6d4350c83
-
SHA256
c86dd42f564dd64505d70fbf852bd5069d4dcf092fea145a125d49c219b4fb78
-
SHA512
152464c4715572790303eccee2359e61854f36c8f12f0b82e10d0cdeb53f1f9c7580b04b30e20f7349abf363e6534f1dac79c32515d9f87cdcbfe1f7be433b6c
-
SSDEEP
3072:e4+nqaIS0aBTcgfWcY2ESbA+JDeedzMTBf1Mva83MeO/ya:fS0QTX+J2ESM+JxdzMTBt383MB/
Malware Config
Extracted
qakbot
404.30
obama223
1668757345
68.47.128.161:443
87.65.160.87:995
172.90.139.138:2222
86.175.128.143:443
12.172.173.82:465
71.247.10.63:2083
47.41.154.250:443
91.254.215.167:443
71.31.101.183:443
81.229.117.95:2222
24.4.239.157:443
41.99.177.175:443
92.149.205.238:2222
73.230.28.7:443
47.229.96.60:443
186.188.2.193:443
174.112.25.29:2078
84.35.26.14:995
86.130.9.167:2222
116.74.163.221:443
86.195.32.149:2222
80.13.179.151:2222
64.207.237.118:443
24.206.27.39:443
170.253.25.35:443
157.231.42.190:995
170.249.59.153:443
174.101.111.4:443
23.240.47.58:995
99.229.146.120:443
184.155.91.69:443
89.129.109.27:2222
91.169.12.198:32100
87.202.101.164:50000
197.148.17.17:2078
94.63.65.146:443
69.133.162.35:443
24.64.114.59:2078
76.20.42.45:443
71.183.236.133:443
12.172.173.82:990
70.66.199.12:443
45.248.169.101:443
90.104.22.28:2222
90.89.95.158:2222
76.80.180.154:995
176.142.207.63:443
91.165.188.74:50000
72.82.136.90:443
88.126.94.4:50000
64.228.191.212:2222
12.172.173.82:21
142.161.27.232:2222
71.247.10.63:50003
108.6.249.139:443
184.176.154.83:995
174.104.184.149:443
82.34.170.37:443
47.34.30.133:443
71.247.10.63:995
70.64.77.115:443
175.205.2.54:443
92.207.132.174:2222
76.127.192.23:443
182.66.197.35:443
98.147.155.235:443
49.175.72.56:443
82.31.37.241:443
73.36.196.11:443
2.84.98.228:2222
188.54.79.88:995
184.153.132.82:443
74.66.134.24:443
172.117.139.142:995
24.64.114.59:3389
12.172.173.82:2087
78.92.133.215:443
24.64.114.59:2222
50.68.204.71:995
105.184.161.242:443
12.172.173.82:22
221.161.103.6:443
98.145.23.67:443
73.161.176.218:443
50.68.204.71:443
24.142.218.202:443
66.191.69.18:995
183.82.100.110:2222
24.49.232.96:443
70.115.104.126:995
176.151.15.101:443
93.156.103.241:443
86.217.250.15:2222
12.172.173.82:443
173.18.126.3:443
157.231.42.190:443
92.24.200.226:995
187.199.224.16:32103
213.91.235.146:443
188.4.142.139:995
199.83.165.233:443
63.248.148.87:443
58.162.223.233:443
102.159.188.241:443
12.172.173.82:50001
174.45.15.123:443
86.171.75.63:443
75.99.125.238:2222
75.158.15.211:443
79.37.204.67:443
27.110.134.202:995
12.172.173.82:993
58.247.115.126:995
181.118.183.116:443
31.167.227.31:443
2.83.62.105:443
77.126.81.208:443
174.112.25.29:2222
92.106.70.62:2222
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
Files
-
1944-58-0x0000000000230000-0x000000000025A000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ