Behavioral task
behavioral1
Sample
2012-54-0x0000000010000000-0x0000000010024000-memory.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
2012-54-0x0000000010000000-0x0000000010024000-memory.dll
Resource
win10v2004-20230220-en
General
-
Target
2012-54-0x0000000010000000-0x0000000010024000-memory.dmp
-
Size
144KB
-
MD5
62221ba4e202934677eebb0922b39368
-
SHA1
2c06ddd06f33aa5eeca8cd3f535489d72577b172
-
SHA256
b86c2d9ab4a6ddebc1e8d0ab1905ff4c39a8e21a6f0f59457ee681ba9387aeaf
-
SHA512
dc5702a2389f7f8fc4dd0769ace37cf41e89db03a14ae47d2dc093d5a591f6e084e5d3d758c72eca32ed2c49a7618b837a07771944c55a96437615453a6fc89b
-
SSDEEP
3072:TuUtexa1mQ4GH6MlnzXFAEJjsVVHS8TBffGWpn8:T3teP/GaMlT2EJ4VVHS8TB3
Malware Config
Extracted
qakbot
404.919
obama250
1681195951
71.38.155.217:443
81.101.185.146:443
86.195.14.72:2222
112.222.83.147:6881
94.5.98.77:443
87.243.146.59:443
190.78.69.250:2222
50.68.204.71:995
184.182.66.109:443
70.28.50.223:32100
83.114.60.6:2222
89.129.109.27:2222
80.12.88.148:2222
74.66.134.24:443
86.130.9.222:2222
12.172.173.82:21
73.36.196.11:443
12.172.173.82:465
186.64.67.25:443
2.36.64.159:2078
87.57.13.215:443
90.211.192.113:443
136.232.184.134:995
202.184.218.218:443
103.111.70.66:995
95.242.101.251:995
81.229.117.95:2222
49.175.72.99:443
23.30.22.225:995
92.154.17.149:2222
23.30.22.225:993
104.35.24.154:443
176.133.4.230:995
176.202.45.209:443
84.215.202.8:443
174.118.63.123:443
84.35.26.14:995
47.34.30.133:443
198.2.51.242:993
69.133.162.35:443
122.184.143.83:443
91.169.12.198:32100
47.21.51.138:443
35.143.97.145:995
49.245.95.124:2222
12.172.173.82:32101
64.121.161.102:443
70.28.50.223:1194
139.226.47.229:995
58.162.223.233:443
70.28.50.223:3389
92.1.170.110:995
70.28.50.223:2087
202.142.98.62:995
103.123.223.141:443
50.68.204.71:443
213.67.139.53:2222
172.115.17.50:443
50.68.204.71:993
123.3.240.16:995
99.228.131.116:2222
72.203.216.98:2222
50.68.186.195:443
59.28.84.65:443
213.91.235.146:443
75.143.236.149:443
174.4.89.3:443
71.31.232.65:995
76.170.252.153:995
70.28.50.223:2083
12.172.173.82:22
184.153.132.82:443
73.207.160.219:443
95.60.243.61:995
72.134.124.16:443
161.142.103.5:995
43.243.215.210:443
116.72.250.18:443
125.99.69.178:443
27.0.48.233:443
202.142.98.62:443
116.74.164.245:443
119.82.123.160:443
12.172.173.82:993
70.112.206.5:443
184.176.35.223:2222
90.55.106.37:2222
92.9.45.20:2222
23.30.22.225:50003
79.77.142.22:2222
86.45.66.141:2222
12.172.173.82:20
86.99.79.136:2222
162.248.14.107:443
23.30.22.225:443
174.21.64.35:2222
71.31.100.192:443
86.98.23.66:443
178.175.187.254:443
90.104.151.37:2222
84.155.13.118:995
73.22.121.210:443
98.145.23.67:443
77.126.185.173:443
103.141.50.79:995
78.159.145.17:995
86.225.214.138:2222
88.126.94.4:50000
71.171.83.69:443
47.205.25.170:443
172.248.42.122:443
14.192.241.76:995
12.172.173.82:50001
24.206.27.39:443
75.109.111.89:443
201.244.108.183:995
12.172.173.82:2087
76.178.148.107:2222
103.212.19.254:995
103.111.70.66:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
Files
-
2012-54-0x0000000010000000-0x0000000010024000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ