Behavioral task
behavioral1
Sample
968-57-0x0000000000570000-0x0000000000593000-memory.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
968-57-0x0000000000570000-0x0000000000593000-memory.dll
Resource
win10v2004-20220812-en
General
-
Target
968-57-0x0000000000570000-0x0000000000593000-memory.dmp
-
Size
140KB
-
MD5
8703caeb1b1c6325b2986e21df1e4a5a
-
SHA1
8ca1e6cc24a240d82b3b31f4badcd0ad7f2f83f6
-
SHA256
e994dc7ba1b65b75b8e9b4bd087dc9cd8493cd01ad75562a6d65dcb7f04f0eb3
-
SHA512
660e6b04fc9c7893f0fbc2600469aa6b171ebc25dcce9feb641da15470b34bd8235a4686b3f9210c0e7bdcfd5051c501ff54a2707e38c33debe2ecb90ae1d4e6
-
SSDEEP
3072:JkQbwAoJZ9wdL/5fXjGCAAJEhZLkMTBfP5oiM:JFolsL/xTGHAJiVkMTBH5oiM
Malware Config
Extracted
qakbot
404.510
BB15
1676454281
75.143.236.149:443
85.61.165.153:2222
103.231.216.238:443
181.118.206.65:995
183.87.163.165:443
98.145.23.67:443
150.107.231.59:2222
122.184.143.82:443
82.127.204.82:2222
136.244.25.165:443
50.68.204.71:443
162.248.14.107:443
114.79.180.14:995
75.98.154.19:443
86.130.9.232:2222
124.122.56.144:443
85.241.180.94:443
2.99.47.198:2222
109.150.179.236:2222
73.29.92.128:443
202.142.98.62:443
190.206.75.58:2222
12.172.173.82:50001
35.143.97.145:995
174.104.184.149:443
12.172.173.82:995
76.170.252.153:995
73.161.176.218:443
65.190.242.244:443
24.206.27.39:443
116.72.250.18:443
12.172.173.82:2087
176.142.207.63:443
87.221.197.113:2222
89.129.109.27:2222
84.35.26.14:995
12.172.173.82:465
50.68.204.71:993
12.172.173.82:21
12.172.173.82:990
47.34.30.133:443
156.216.125.255:995
24.239.69.244:443
68.108.122.180:443
173.18.126.3:443
45.50.233.214:443
24.71.120.191:443
73.165.119.20:443
41.230.174.134:443
90.104.22.28:2222
74.33.196.114:443
121.121.100.207:995
81.157.227.223:2222
62.35.67.88:443
151.65.224.211:443
12.172.173.82:20
67.187.130.101:443
172.248.42.122:443
85.85.34.201:993
93.156.99.48:443
47.149.78.242:443
161.142.107.68:995
47.21.51.138:443
58.247.115.126:995
125.99.69.178:443
116.75.63.211:443
109.49.52.108:2222
92.97.197.177:2222
149.74.159.67:2222
202.142.98.62:995
103.42.86.110:995
103.123.223.76:443
27.0.48.233:443
92.27.86.48:2222
213.67.255.57:2222
31.53.29.145:2222
59.28.84.65:443
136.232.184.134:995
103.212.19.254:995
217.165.186.116:2222
86.96.72.139:2222
188.83.248.76:443
64.237.185.60:443
2.50.48.213:443
77.86.98.236:443
103.141.50.102:995
217.128.91.196:2222
2.13.73.146:2222
46.27.231.50:2078
27.109.19.90:2078
86.207.227.152:2222
104.35.24.154:443
201.244.108.183:995
190.75.132.158:2222
184.176.35.223:2222
190.11.198.75:443
98.37.25.99:443
82.212.115.188:443
205.164.227.222:443
88.126.94.4:50000
86.250.12.217:2222
188.49.125.169:995
86.202.48.142:2222
103.252.7.231:443
86.225.214.138:2222
87.202.101.164:50000
86.195.14.72:2222
84.215.202.22:443
95.255.60.223:995
74.92.243.113:50000
90.213.146.227:443
103.144.201.53:2078
27.0.48.205:443
88.126.112.14:50000
209.142.97.83:995
108.2.111.66:995
114.143.176.234:443
24.228.132.224:2222
85.59.61.52:2222
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
Files
-
968-57-0x0000000000570000-0x0000000000593000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ