General

  • Target

    1756-56-0x00000000001C0000-0x00000000001EA000-memory.dmp

  • Size

    168KB

  • MD5

    0feaeda6f0759e961596fd7cc32404e3

  • SHA1

    3dd36130bd26d6170141383d5c2e017dbbf4f222

  • SHA256

    d5cc641f922ab7e2c68231c3d8696c450132e9a2874076fc0669bab1eac54de1

  • SHA512

    2ba469b3189aaabd3a64d37981e06e5af7fb98267af01f6f6e98aef6f662dbc75b36c833cf0aa19071a48d954ffd9070690bbaac89729ff60d818edde95b3ca3

  • SSDEEP

    3072:CgquZd7BbtzKk2z7VqgMAWJ+UrIXTBf5qtO/ya1v:nd7R532/VqgJWJBrIXTBRq8/

Score
10/10

Malware Config

Extracted

Family

qakbot

Version

404.46

Botnet

azd

Campaign

1670585059

C2

173.239.94.212:443

91.169.12.198:32100

74.66.134.24:443

66.191.69.18:995

182.75.189.42:995

78.69.251.252:2222

98.145.23.67:443

103.71.21.107:443

197.94.219.133:443

91.68.227.219:443

12.172.173.82:993

86.176.83.127:2222

64.121.161.102:443

41.98.21.114:443

92.154.17.149:2222

151.65.67.211:443

89.129.109.27:2222

76.11.14.249:443

69.119.123.159:2222

70.66.199.12:443

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 1756-56-0x00000000001C0000-0x00000000001EA000-memory.dmp
    .dll windows x86


    Headers

    Sections