qqqq
Behavioral task
behavioral1
Sample
2d90000.dll
Resource
win7-20220812-en
General
-
Target
2d90000.dll
-
Size
168KB
-
MD5
d77ce1693c7809bb5a38a6d2235545ae
-
SHA1
2396ccb7957476085eacb7bb6e3e5b99a7a873af
-
SHA256
5d111ecc2ea0919b641b48a6e0d907466557ebec1a6f5369da93c44abeb16697
-
SHA512
250b80194055783a2284adde4c03eb8761623bfc070c3f292b844d5f089c5a23da34eeecd597af35e7f15990019f0c41249324087e72d510c5f3759e4a51ee22
-
SSDEEP
3072:BLsrdIkOMe0R0+68PxBG4AnJbhzr7TBfZ9ByO/yanCFJ:2Ij0y+6wxYdnJdzr7TBR9BN/Py
Malware Config
Extracted
qakbot
404.60
obama230
1671447345
108.162.6.34:443
45.152.16.14:443
87.65.160.87:995
109.220.196.24:2222
86.176.144.240:2222
73.36.196.11:443
70.66.199.12:443
2.99.47.198:2222
171.97.42.82:443
71.31.101.183:443
74.33.196.114:443
75.158.15.211:443
12.172.173.82:32101
45.248.169.101:443
174.104.184.149:443
90.66.229.185:2222
98.145.23.67:443
152.170.17.136:443
86.160.253.56:443
89.152.120.181:443
91.68.227.219:443
173.18.126.3:443
162.248.14.107:443
12.172.173.82:21
181.4.227.82:443
184.68.116.146:61202
184.176.154.83:995
92.207.132.174:2222
75.98.154.19:443
81.248.77.37:2222
142.161.27.232:2222
46.10.198.106:443
198.2.51.242:993
50.68.204.71:993
91.231.172.236:995
79.77.142.22:2222
24.142.218.202:443
80.44.148.126:2222
78.101.91.215:2222
69.133.162.35:443
197.0.243.240:443
184.68.116.146:2078
12.172.173.82:22
144.64.226.144:443
86.225.214.138:2222
93.156.97.50:443
90.104.22.28:2222
71.112.212.166:443
84.113.121.103:443
90.4.190.217:2222
174.58.146.57:443
81.111.108.123:443
90.27.44.76:2222
176.79.48.60:443
83.213.201.104:993
2.14.96.234:2222
24.71.120.191:443
121.121.100.148:995
172.90.139.138:2222
70.55.120.16:2222
75.99.125.234:2222
172.248.42.122:443
37.14.229.220:2222
83.7.52.202:443
85.241.180.94:443
90.206.194.248:443
31.53.29.141:2222
72.80.7.6:50003
74.92.243.113:50000
90.48.151.17:2222
176.142.207.63:443
178.153.5.54:443
74.66.134.24:443
46.162.109.183:443
12.172.173.82:993
64.237.240.3:443
65.20.175.208:443
69.119.123.159:2222
94.105.123.53:443
99.229.164.42:443
91.169.12.198:32100
184.153.132.82:443
81.229.117.95:2222
82.34.170.37:443
86.96.75.237:2222
27.109.19.90:2078
109.219.126.249:2222
91.165.188.74:50000
175.139.130.191:2222
76.20.42.45:443
12.172.173.82:50001
91.96.249.3:443
150.107.231.59:2222
12.172.173.82:995
128.127.21.57:443
184.68.116.146:2222
87.220.205.65:2222
184.68.116.146:3389
87.223.95.66:443
92.189.214.236:2222
73.29.92.128:443
86.183.251.169:2222
82.6.99.234:443
92.27.86.48:2222
174.112.22.106:2078
187.199.184.14:32103
199.83.165.233:443
37.15.128.31:2222
90.79.129.166:2222
136.244.25.165:443
93.147.134.85:443
202.187.239.67:995
75.143.236.149:443
67.235.138.14:443
84.35.26.14:995
147.148.234.231:2222
108.6.249.139:443
86.98.23.199:443
60.254.51.168:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
Files
-
2d90000.dll.dll windows x86
bb8f7c7fc8b521232817f0f359bdf0f2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memchr
_strtoi64
_errno
_snprintf
qsort
_vsnprintf
memset
_time64
_vsnwprintf
malloc
strncpy
strchr
strtod
localeconv
_ftol2_sse
free
atol
memcpy
kernel32
GetExitCodeProcess
GetTickCount
GetModuleHandleA
GetWindowsDirectoryW
GetCurrentDirectoryW
GetSystemInfo
GetVersionExA
CreateMutexW
DuplicateHandle
GetCurrentThread
lstrcmpA
GetLastError
lstrcatA
GetLocaleInfoA
CreateDirectoryW
DisconnectNamedPipe
lstrcpynW
GetProcessId
GetFileAttributesW
SetCurrentDirectoryA
Sleep
lstrcmpiW
GetDriveTypeW
K32GetModuleFileNameExW
MoveFileW
lstrcpynA
lstrlenW
GetCurrentProcessId
SwitchToThread
GetModuleHandleW
GetProcAddress
MultiByteToWideChar
lstrcatW
WideCharToMultiByte
HeapCreate
HeapFree
HeapAlloc
LoadLibraryA
FreeLibrary
lstrcmpiA
GetSystemTimeAsFileTime
SetThreadPriority
FindFirstFileW
FindNextFileW
SetFileAttributesW
LocalAlloc
FlushFileBuffers
LoadLibraryW
GetCommandLineW
user32
GetIconInfo
CopyIcon
GetDC
CharUpperBuffA
CharUpperBuffW
RegisterClassExA
UnregisterClassA
CreateWindowExA
DestroyWindow
DefWindowProcW
DrawIconEx
GetCursorInfo
gdi32
SelectObject
GetObjectW
BitBlt
CreateCompatibleBitmap
DeleteObject
CreateCompatibleDC
GetDIBits
GetDeviceCaps
DeleteDC
shell32
CommandLineToArgvW
ole32
CoCreateInstance
CoInitializeEx
CoSetProxyBlanket
CoInitializeSecurity
oleaut32
VariantClear
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayDestroy
SysFreeString
SysAllocString
SafeArrayGetLBound
Exports
Exports
Sections
.text Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ