Wind
Behavioral task
behavioral1
Sample
0307ab4d314e349614030c4fde71a9d5f0fba388efcc24dd621ccf8466166c8f.dll
Resource
win7-20220812-en
General
-
Target
0307ab4d314e349614030c4fde71a9d5f0fba388efcc24dd621ccf8466166c8f.dll
-
Size
133KB
-
MD5
1274c28cd397874482b003818a1289d1
-
SHA1
be7c58d18a5d10dd7e3571fe8a7019382fa89b5a
-
SHA256
0307ab4d314e349614030c4fde71a9d5f0fba388efcc24dd621ccf8466166c8f
-
SHA512
7f322e636e2d1f4ae143f474674a90388ab410156097334482108f115360e97adf27a5a2ffee418365ba3981a251d6627159acf2699d9901f0468b879762a87c
-
SSDEEP
3072:SQNbnQ4MnC3pDGCjZJzkWjGRAuJjen68TBfPOo/q:Sp4MnCZCCViWjGauJyn68TBHOo/q
Malware Config
Extracted
qakbot
404.510
tok01
1676453967
75.143.236.149:443
85.61.165.153:2222
103.231.216.238:443
181.118.206.65:995
183.87.163.165:443
98.145.23.67:443
150.107.231.59:2222
122.184.143.82:443
82.127.204.82:2222
136.244.25.165:443
50.68.204.71:443
162.248.14.107:443
114.79.180.14:995
75.98.154.19:443
86.130.9.232:2222
124.122.56.144:443
85.241.180.94:443
2.99.47.198:2222
109.150.179.236:2222
73.29.92.128:443
202.142.98.62:443
190.206.75.58:2222
12.172.173.82:50001
35.143.97.145:995
174.104.184.149:443
12.172.173.82:995
76.170.252.153:995
73.161.176.218:443
65.190.242.244:443
24.206.27.39:443
116.72.250.18:443
12.172.173.82:2087
176.142.207.63:443
87.221.197.113:2222
89.129.109.27:2222
84.35.26.14:995
12.172.173.82:465
50.68.204.71:993
12.172.173.82:21
12.172.173.82:990
47.34.30.133:443
156.216.125.255:995
24.239.69.244:443
68.108.122.180:443
173.18.126.3:443
45.50.233.214:443
24.71.120.191:443
73.165.119.20:443
41.230.174.134:443
90.104.22.28:2222
74.33.196.114:443
121.121.100.207:995
81.157.227.223:2222
62.35.67.88:443
151.65.224.211:443
12.172.173.82:20
67.187.130.101:443
172.248.42.122:443
85.85.34.201:993
93.156.99.48:443
47.149.78.242:443
161.142.107.68:995
47.21.51.138:443
58.247.115.126:995
125.99.69.178:443
116.75.63.211:443
109.49.52.108:2222
92.97.197.177:2222
149.74.159.67:2222
202.142.98.62:995
103.42.86.110:995
103.123.223.76:443
27.0.48.233:443
92.27.86.48:2222
213.67.255.57:2222
31.53.29.145:2222
59.28.84.65:443
136.232.184.134:995
103.212.19.254:995
217.165.186.116:2222
86.96.72.139:2222
188.83.248.76:443
64.237.185.60:443
2.50.48.213:443
77.86.98.236:443
103.141.50.102:995
217.128.91.196:2222
2.13.73.146:2222
46.27.231.50:2078
27.109.19.90:2078
86.207.227.152:2222
104.35.24.154:443
201.244.108.183:995
190.75.132.158:2222
184.176.35.223:2222
190.11.198.75:443
98.37.25.99:443
82.212.115.188:443
205.164.227.222:443
88.126.94.4:50000
86.250.12.217:2222
188.49.125.169:995
86.202.48.142:2222
103.252.7.231:443
86.225.214.138:2222
87.202.101.164:50000
86.195.14.72:2222
84.215.202.22:443
95.255.60.223:995
74.92.243.113:50000
90.213.146.227:443
103.144.201.53:2078
27.0.48.205:443
88.126.112.14:50000
209.142.97.83:995
108.2.111.66:995
114.143.176.234:443
24.228.132.224:2222
85.59.61.52:2222
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
Files
-
0307ab4d314e349614030c4fde71a9d5f0fba388efcc24dd621ccf8466166c8f.dll.dll windows x86
1bd51003f5494b32d39257bf6bbbb175
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
windowscodecs
WICMapSchemaToName
WICMapShortNameToGuid
WICMapGuidToShortName
msvcrt
localeconv
strtod
strchr
strncpy
_time64
malloc
free
memset
memchr
_strtoi64
_errno
_snprintf
_ftol2_sse
_vsnwprintf
memcpy
atol
qsort
_vsnprintf
kernel32
SwitchToThread
GetModuleHandleW
GetProcAddress
HeapCreate
HeapFree
HeapAlloc
GetModuleHandleA
lstrlenW
MultiByteToWideChar
lstrcatW
WideCharToMultiByte
LoadLibraryW
FreeLibrary
GetCommandLineW
GetVersionExA
GetSystemInfo
GetCurrentDirectoryW
GetWindowsDirectoryW
lstrcmpiA
GetSystemTimeAsFileTime
FindFirstFileW
FindNextFileW
SetFileAttributesW
GetExitCodeProcess
LocalAlloc
lstrcpynA
FlushFileBuffers
SetThreadPriority
GetTickCount
MoveFileW
K32GetModuleFileNameExW
lstrcmpA
DisconnectNamedPipe
GetProcessId
GetCurrentThread
DuplicateHandle
CreateMutexW
lstrcatA
CreateDirectoryW
GetLastError
lstrcpynW
GetDriveTypeW
lstrcmpiW
Sleep
SetCurrentDirectoryA
GetLocaleInfoA
GetFileAttributesW
GetCurrentProcessId
LoadLibraryA
user32
RegisterClassExA
UnregisterClassA
CreateWindowExA
DestroyWindow
CharUpperBuffW
CharUpperBuffA
DefWindowProcW
gdi32
CreatePatternBrush
GdiTransparentBlt
CreateHalftonePalette
CreateFontIndirectExW
CreateEnhMetaFileA
CreateScalableFontResourceA
CreatePenIndirect
CreateSolidBrush
CreateEllipticRgn
CreateDIBPatternBrush
CreateDIBPatternBrushPt
CreateRoundRectRgn
CreateRectRgnIndirect
CreateEllipticRgnIndirect
CreateHatchBrush
CreateBrushIndirect
CreateBitmapIndirect
GdiGetBatchLimit
CreateDIBSection
CreateFontA
CreateScalableFontResourceW
advapi32
CreatePrivateObjectSecurity
GetEventLogInformation
AddAccessDeniedAce
BuildTrusteeWithSidA
AccessCheckByTypeAndAuditAlarmA
AddAccessAllowedAceEx
EnumerateTraceGuidsEx
AccessCheckAndAuditAlarmA
ChangeServiceConfig2A
AddAccessAllowedAce
EventWriteString
EventActivityIdControl
ConvertToAutoInheritPrivateObjectSecurity
GetAce
FindFirstFreeAce
EventWrite
EventWriteEx
AddAuditAccessObjectAce
EqualDomainSid
EventWriteTransfer
CloseTrace
shell32
CommandLineToArgvW
ole32
CoInitializeSecurity
CoSetProxyBlanket
CoInitializeEx
CoCreateInstance
oleaut32
SafeArrayGetUBound
VariantClear
SafeArrayGetLBound
SysFreeString
SysAllocString
SafeArrayGetElement
SafeArrayDestroy
Exports
Exports
Sections
.text Size: 99KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ