Behavioral task
behavioral1
Sample
544-64-0x0000000010000000-0x000000001002A000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
544-64-0x0000000010000000-0x000000001002A000-memory.dll
Resource
win10v2004-20221111-en
General
-
Target
544-64-0x0000000010000000-0x000000001002A000-memory.dmp
-
Size
168KB
-
MD5
5889d304e478dab80f53b699db5362ae
-
SHA1
3a4c9d5072ad7ec22b411ccfbf5b3824c878fab0
-
SHA256
01df499f793110337e9eac49fe73b91bb73d778be56dada6b186893d4c99235f
-
SHA512
c5c8778054271f90ead4802a23260fb03eeac50b9c96383f34a8cffd941f83afc14e56b32f60d57dff06ebc52cf727a15ec50e1c16a7dbc20dfca3934d41a2c9
-
SSDEEP
3072:ygikbXp3BvScvqzzxVvAAWJ6AzZHTBfZSEO/yaKv:1TdRXvqXxh1WJJzZHTBRSv/
Malware Config
Extracted
qakbot
404.46
BB11
1671442875
24.71.120.191:443
121.121.100.148:995
172.90.139.138:2222
70.55.120.16:2222
75.99.125.234:2222
172.248.42.122:443
37.14.229.220:2222
83.7.52.202:443
85.241.180.94:443
90.206.194.248:443
31.53.29.141:2222
72.80.7.6:50003
74.92.243.113:50000
90.48.151.17:2222
176.142.207.63:443
178.153.5.54:443
74.66.134.24:443
46.162.109.183:443
12.172.173.82:993
64.237.240.3:443
65.20.175.208:443
69.119.123.159:2222
94.105.123.53:443
99.229.164.42:443
91.169.12.198:32100
184.153.132.82:443
81.229.117.95:2222
82.34.170.37:443
86.96.75.237:2222
27.109.19.90:2078
109.219.126.249:2222
91.165.188.74:50000
175.139.130.191:2222
76.20.42.45:443
12.172.173.82:50001
91.96.249.3:443
150.107.231.59:2222
12.172.173.82:995
128.127.21.57:443
184.68.116.146:2222
87.220.205.65:2222
184.68.116.146:3389
87.223.95.66:443
92.189.214.236:2222
73.29.92.128:443
86.165.15.180:2222
82.6.99.234:443
92.27.86.48:2222
174.112.22.106:2078
187.199.184.14:32103
199.83.165.233:443
37.15.128.31:2222
90.79.129.166:2222
136.244.25.165:443
93.147.134.85:443
202.187.239.67:995
75.143.236.149:443
67.235.138.14:443
84.35.26.14:995
147.148.234.231:2222
108.6.249.139:443
86.98.23.199:443
60.254.51.168:443
103.55.67.180:443
176.44.121.220:995
103.42.86.42:995
103.141.50.151:995
217.128.200.114:2222
24.228.132.224:2222
90.119.197.132:2222
76.80.180.154:995
72.80.7.6:995
50.68.204.71:995
47.34.30.133:443
103.212.19.254:995
116.74.163.30:443
47.41.154.250:443
83.110.95.209:995
50.68.204.71:443
78.100.238.92:995
12.172.173.82:465
90.116.219.167:2222
86.99.15.254:2222
62.35.67.88:443
92.186.69.229:2222
84.108.173.79:443
79.13.202.140:443
77.86.98.236:443
123.3.240.16:995
86.196.35.232:2222
70.115.104.126:995
86.130.9.250:2222
92.185.204.18:2078
213.67.255.57:2222
73.36.196.11:443
186.64.67.55:443
103.144.201.62:2078
90.78.138.217:2222
76.170.252.153:995
87.202.101.164:50000
89.129.109.27:2222
87.57.13.215:443
108.162.6.34:443
87.65.160.87:995
45.152.16.14:443
12.172.173.82:20
85.245.221.87:2078
98.145.23.67:443
73.155.10.79:443
171.97.42.82:443
71.31.101.183:443
74.33.196.114:443
12.172.173.82:32101
45.248.169.101:443
174.104.184.149:443
90.66.229.185:2222
184.68.116.146:2078
12.172.173.82:22
173.18.126.3:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
Files
-
544-64-0x0000000010000000-0x000000001002A000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ