General

  • Target

    4564-155-0x0000000010000000-0x0000000010023000-memory.dmp

  • Size

    140KB

  • MD5

    dcb3483a8843d5335233a571096f7b2f

  • SHA1

    f3fdd51477f1134de2a68f79de077761f340837e

  • SHA256

    57d6276da0abf835d82cbb6e661f3aae98511f4527a176f94c4882f0abc160d9

  • SHA512

    07d2f71263dd2890c996c37f94bf92d7f0577daadb14fc13c96b6e2b83d0fc9afd1d4be7a2d2aed87d2862cf2e4122009c067eefcca3412f3c9761d9f8ea3165

  • SSDEEP

    3072:fYsvVxGf6etSkipCRP2HSxGRA7JiGnwH8TBfPfYZzc:fPuf6ecDC1xGa7JfnwH8TBHAZzc

Score
10/10

Malware Config

Extracted

Family

qakbot

Version

404.492

Botnet

BB14

Campaign

1675755007

C2

50.68.186.195:443

69.242.31.249:443

88.126.112.14:50000

73.161.176.218:443

87.149.176.97:443

92.154.45.81:2222

50.68.204.71:443

86.195.14.72:2222

136.244.25.165:443

75.143.236.149:443

109.149.147.177:2222

171.97.42.67:443

86.96.72.139:2222

87.202.101.164:50000

104.35.24.154:443

174.104.184.149:443

45.72.110.133:443

12.172.173.82:50001

92.154.17.149:2222

2.14.144.105:2222

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 4564-155-0x0000000010000000-0x0000000010023000-memory.dmp
    .dll windows x86


    Headers

    Sections