General

  • Target

    1416-55-0x0000000010000000-0x0000000010024000-memory.dmp

  • Size

    144KB

  • MD5

    94594bf987444397120ffb99e02201f5

  • SHA1

    d1ea852322a02e11a92886199c269635dd4012dd

  • SHA256

    2c6e9f2662b84600e3337c1fb6df154e299d127dc1e2eaf8ac220fdfade0c050

  • SHA512

    8676114c866fb1d1ec8107530b000a9b27d787eeada111ad9e31d579f196413700eb55a690cda8be29e17b9a21efe509d7443fcf596d48372e3b3be5c4826536

  • SSDEEP

    3072:7k8S6pIG2Q2Ill3z5lru0A6EJhQVVHM8TBffyDV0:lS6VrP3dlihzJeVVHM8TB3y

Score
10/10

Malware Config

Extracted

Family

qakbot

Version

404.1026

Botnet

BB25

Campaign

1682502994

C2

91.169.12.198:32100

86.45.66.141:2222

176.202.45.209:443

85.84.222.49:443

124.246.122.199:2222

94.200.183.66:2222

49.245.95.124:2222

70.26.75.148:2222

12.172.173.82:993

27.0.48.233:443

79.77.142.22:2222

50.68.204.71:443

50.68.204.71:993

103.140.174.20:2222

81.159.211.209:2222

70.28.50.223:2087

123.3.240.16:995

86.130.9.135:2222

2.82.8.80:443

76.178.148.107:2222

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

  • Qakbot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1416-55-0x0000000010000000-0x0000000010024000-memory.dmp
    .dll windows x86


    Headers

    Sections