Behavioral task
behavioral1
Sample
1416-55-0x0000000010000000-0x0000000010024000-memory.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1416-55-0x0000000010000000-0x0000000010024000-memory.dll
Resource
win10v2004-20230220-en
General
-
Target
1416-55-0x0000000010000000-0x0000000010024000-memory.dmp
-
Size
144KB
-
MD5
94594bf987444397120ffb99e02201f5
-
SHA1
d1ea852322a02e11a92886199c269635dd4012dd
-
SHA256
2c6e9f2662b84600e3337c1fb6df154e299d127dc1e2eaf8ac220fdfade0c050
-
SHA512
8676114c866fb1d1ec8107530b000a9b27d787eeada111ad9e31d579f196413700eb55a690cda8be29e17b9a21efe509d7443fcf596d48372e3b3be5c4826536
-
SSDEEP
3072:7k8S6pIG2Q2Ill3z5lru0A6EJhQVVHM8TBffyDV0:lS6VrP3dlihzJeVVHM8TB3y
Malware Config
Extracted
qakbot
404.1026
BB25
1682502994
91.169.12.198:32100
86.45.66.141:2222
176.202.45.209:443
85.84.222.49:443
124.246.122.199:2222
94.200.183.66:2222
49.245.95.124:2222
70.26.75.148:2222
12.172.173.82:993
27.0.48.233:443
79.77.142.22:2222
50.68.204.71:443
50.68.204.71:993
103.140.174.20:2222
81.159.211.209:2222
70.28.50.223:2087
123.3.240.16:995
86.130.9.135:2222
2.82.8.80:443
76.178.148.107:2222
183.87.163.165:443
92.9.45.20:2222
88.126.94.4:50000
125.99.76.102:443
109.149.147.12:2222
46.24.47.205:995
197.0.179.190:443
147.147.30.126:2222
103.141.50.79:995
88.122.133.88:32100
92.186.69.229:2222
12.172.173.82:32101
89.90.151.12:443
86.171.131.244:995
81.229.117.95:2222
72.134.124.16:443
187.199.153.185:32103
70.160.80.210:443
86.96.72.175:2222
35.143.97.145:995
103.123.223.130:443
197.2.168.63:443
173.88.135.179:443
70.28.50.223:2083
84.108.200.161:443
59.28.84.65:443
213.91.235.146:443
12.172.173.82:995
104.35.24.154:443
24.236.90.197:2078
76.170.252.153:995
47.34.30.133:443
71.38.155.217:443
84.215.202.8:443
173.18.122.24:443
70.28.50.223:1194
72.205.104.134:443
12.172.173.82:465
93.150.183.229:2222
23.30.173.133:443
175.143.62.40:2222
12.172.173.82:2087
24.206.27.39:443
201.244.108.183:995
116.75.63.58:443
139.226.47.229:995
119.82.121.87:443
144.64.226.144:443
12.172.173.82:22
92.27.86.48:2222
197.94.78.32:443
124.149.143.189:2222
12.172.173.82:20
109.50.147.18:2222
27.109.19.90:2078
184.153.132.82:443
2.237.150.131:2222
89.114.140.100:443
96.56.197.26:2083
92.20.204.198:2222
68.229.150.95:443
69.133.162.35:443
74.102.98.63:2222
161.142.98.36:995
92.149.250.113:2222
122.184.143.85:443
102.156.122.180:443
202.186.177.220:443
151.213.66.34:995
47.229.96.60:443
217.165.239.223:443
90.104.151.37:2222
2.14.24.66:2222
47.205.25.170:443
14.192.241.76:995
76.86.31.59:443
174.4.89.3:443
114.143.176.235:443
70.28.50.223:3389
50.68.186.195:443
122.186.210.254:443
76.16.49.134:443
78.192.109.105:2222
75.143.236.149:443
149.74.159.67:2222
75.109.111.89:443
68.173.170.110:8443
58.186.75.42:443
86.195.14.72:2222
47.21.51.138:443
92.189.214.236:2222
67.10.2.240:995
70.112.206.5:443
86.225.214.138:2222
172.248.42.122:443
147.219.4.194:443
87.67.214.236:995
70.28.50.223:32100
24.139.11.137:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1416-55-0x0000000010000000-0x0000000010024000-memory.dmp
Files
-
1416-55-0x0000000010000000-0x0000000010024000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ