General

  • Target

    1732-57-0x00000000001B0000-0x00000000001D2000-memory.dmp

  • Size

    136KB

  • MD5

    08030ac6f09e294d20bd9fbd41178de8

  • SHA1

    768cd5f949c05b53fa56a5c0b968402ec30ed4de

  • SHA256

    c0c820b8d0bd5fcc4b4093d8e7bef9892048f4ea3593092a236ac0e80fb16f40

  • SHA512

    4830aeb12646883024930d9f7dcbd05d89432199288847f0fcb1c389f75e29be6556d4627c4b4d74b8d727692f640a2139066381cc0ac8f1879dda0f4495680e

  • SSDEEP

    3072:yEtcceW973aTDc+7A/AGJDndK5TBfVRe9f:yUccebTDcRIGJDdK5TBtw9

Score
10/10

Malware Config

Extracted

Family

qakbot

Version

403.862

Botnet

BB

Campaign

1663148750

C2

193.3.19.37:443

99.232.140.205:2222

99.253.251.74:443

197.94.210.133:443

37.210.148.30:995

14.161.194.86:443

154.181.203.230:995

200.161.62.126:32101

134.35.10.122:443

64.207.215.69:443

81.131.161.131:2078

217.165.85.223:993

78.100.225.34:2222

85.114.110.108:443

102.38.96.108:995

123.240.131.1:443

109.158.159.179:993

186.105.182.127:443

190.44.40.48:995

88.233.194.154:2222

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 1732-57-0x00000000001B0000-0x00000000001D2000-memory.dmp
    .dll windows x86


    Headers

    Sections