General

  • Target

    1972-135-0x00000000021C0000-0x00000000021EA000-memory.dmp

  • Size

    168KB

  • MD5

    eff60f1ced3e8a86006a3ff0bb4eefd6

  • SHA1

    8a17dac6f219e06766804e9f13f481490c442eda

  • SHA256

    e0e91100d93e2116fa838deaf5659d76c6551c7d674c438ec38ed3b85a2cee5c

  • SHA512

    fc583dd1332631848b9294b4630ef80c18b3eddadb7a064025969492a05582fdf8425ef69e5f6ea1a826d5bc5ab3a79f126f891c5fd7352864360710eed47bc5

  • SSDEEP

    3072:s4uwHa7AK4BNtIQt2jfOAgJ6EnNETBfptva83/nO/yaa:jwART682jf7gJVnNETBhE83/O/S

Score
10/10

Malware Config

Extracted

Family

qakbot

Version

404.30

Botnet

BB06

Campaign

1668752705

C2

98.147.155.235:443

49.175.72.56:443

82.31.37.241:443

73.36.196.11:443

2.84.98.228:2222

188.54.79.88:995

184.153.132.82:443

74.66.134.24:443

172.117.139.142:995

12.172.173.82:990

24.64.114.59:3389

12.172.173.82:2087

78.92.133.215:443

24.64.114.59:2222

50.68.204.71:995

105.184.161.242:443

12.172.173.82:22

221.161.103.6:443

98.145.23.67:443

73.161.176.218:443

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 1972-135-0x00000000021C0000-0x00000000021EA000-memory.dmp
    .dll windows x86


    Headers

    Sections