General

  • Target

    3052-135-0x0000000000E90000-0x0000000000EBA000-memory.dmp

  • Size

    168KB

  • MD5

    4be9657c9763e7dbad996b9b1fe3ce2b

  • SHA1

    e0518835f0a0408d666b21b0a1f5f88e7d68f1d2

  • SHA256

    3eb7a7cfb1e649d07dbfee44159c2479f08c1e077828a360b0e5a05bf12bb255

  • SHA512

    9e49a492958af6931921d92da7dfad5541281f229373acb267be3346a0c39b1033f82a88b8fbe462bf69ffd0120b576b5595286fd0a23a1d725f4af14f0efa02

  • SSDEEP

    3072:W4WNZ6XXu7mFUbGQ66y0RA+JJnVy6ITBfJeva83qiO/yaa:dXXi/qP6y0a+JBV1ITBBN83q9/S

Score
10/10

Malware Config

Extracted

Family

qakbot

Version

404.30

Botnet

BB06

Campaign

1668752705

C2

98.147.155.235:443

49.175.72.56:443

82.31.37.241:443

73.36.196.11:443

2.84.98.228:2222

188.54.79.88:995

184.153.132.82:443

74.66.134.24:443

172.117.139.142:995

12.172.173.82:990

24.64.114.59:3389

12.172.173.82:2087

78.92.133.215:443

24.64.114.59:2222

50.68.204.71:995

105.184.161.242:443

12.172.173.82:22

221.161.103.6:443

98.145.23.67:443

73.161.176.218:443

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 3052-135-0x0000000000E90000-0x0000000000EBA000-memory.dmp
    .dll windows x86


    Headers

    Sections