General

  • Target

    1704-55-0x00000000007A0000-0x00000000007C3000-memory.dmp

  • Size

    140KB

  • MD5

    c08646a5adb854b9a334884a4f83c479

  • SHA1

    f2f98fe0154558e3cf13b0f35189b93405039e0b

  • SHA256

    45fd289719091a1d368f0d3a811a02374a177f2b15bed0e6dfd4ec6dfa37ec41

  • SHA512

    20e307000e07e096964572130cd4693c9e6d88d85297878b91003b7524f22f8cac73910cece4cd2904a210419dcc38a5c1bec14f34e3fbdc35eec77dd3301aaa

  • SSDEEP

    3072:U98ZxKv+CLz2GOlt+yICipXAvJgZPTITBf/Io:4v+W2GIIHQvJyPTITBXx

Score
10/10

Malware Config

Extracted

Family

qakbot

Version

404.263

Botnet

BB19

Campaign

1678819948

C2

86.45.66.141:2222

93.147.134.85:443

162.248.14.107:443

89.32.159.107:995

50.68.186.195:443

50.68.204.71:443

24.69.84.237:443

92.239.81.124:443

149.74.159.67:2222

176.202.46.81:443

2.82.8.80:443

72.203.216.98:2222

73.22.121.210:443

190.218.125.145:443

76.71.137.91:2222

81.158.112.20:2222

190.191.35.122:443

12.172.173.82:993

98.145.23.67:443

12.172.173.82:22

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

Files

  • 1704-55-0x00000000007A0000-0x00000000007C3000-memory.dmp
    .dll windows x86


    Headers

    Sections