Behavioral task
behavioral1
Sample
1916-55-0x0000000010000000-0x0000000010024000-memory.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1916-55-0x0000000010000000-0x0000000010024000-memory.dll
Resource
win10v2004-20230220-en
General
-
Target
1916-55-0x0000000010000000-0x0000000010024000-memory.dmp
-
Size
144KB
-
MD5
092c40292d24095ce53798532c23d373
-
SHA1
a8355cb1db08f53f9f3dc965055e78e9bd423c3c
-
SHA256
5668126c7260878faf8656f3a245a55035f0e6a0b961007c37d7120e326f03ae
-
SHA512
5d0a7bb4b407f3ec6ae50901824ec980475d4c0efff27f8edfc021fca6e27b3b1a922174e947321e44d52089d5dcc256e69cd1574c9645e1a67c2650162d082c
-
SSDEEP
3072:Jg0KGh5Z8j3EzihlFsUA9QJb4VMHu8TBff5u0dQ:1KGJGEz+lOB2JEVMHu8TB30wQ
Malware Config
Extracted
qakbot
404.1035
BB26
1683182516
47.199.241.39:443
98.176.5.56:443
93.150.183.229:2222
184.176.35.223:2222
75.143.236.149:443
14.192.241.76:995
92.1.170.110:995
73.29.92.128:443
184.153.132.82:443
201.244.108.183:995
92.188.241.102:443
83.114.60.6:2222
86.130.9.128:2222
86.250.12.86:2222
47.21.51.138:443
108.190.115.159:443
98.19.224.125:995
147.147.30.126:2222
12.172.173.82:465
92.149.250.113:2222
2.36.64.159:2078
70.28.50.223:2078
66.131.25.6:443
79.77.142.22:2222
23.30.173.133:443
68.173.170.110:8443
70.64.77.115:443
76.16.49.134:443
49.175.72.7:443
147.219.4.194:443
74.92.243.115:50000
59.28.84.65:443
85.61.165.153:2222
89.129.109.27:2222
80.6.50.34:443
125.99.69.178:443
174.4.89.3:443
50.68.186.195:443
99.230.89.236:2078
184.183.119.24:443
58.162.223.233:443
103.113.68.33:443
198.2.51.242:993
75.98.154.19:443
88.126.94.4:50000
96.56.197.26:2078
24.69.137.232:2222
173.184.44.185:443
47.205.25.170:443
174.21.64.35:2222
197.94.78.32:443
109.159.119.82:2222
12.172.173.82:995
183.87.163.165:443
76.86.31.59:443
173.88.135.179:443
2.82.8.80:443
71.38.155.217:443
27.0.48.233:443
197.2.126.19:443
91.75.121.31:443
190.199.131.69:2222
12.172.173.82:21
176.202.45.209:443
50.68.204.71:993
74.136.224.98:443
186.64.67.41:443
68.229.150.95:443
50.68.204.71:995
70.28.50.223:32100
70.28.50.223:3389
12.172.173.82:32101
98.145.23.67:443
91.169.12.198:32100
151.55.186.41:443
12.172.173.82:993
104.35.24.154:443
50.68.204.71:443
161.142.98.36:995
90.94.143.158:2222
103.140.174.20:2222
70.28.50.223:1194
204.112.31.4:2222
92.186.69.229:2222
172.115.17.50:443
70.160.80.210:443
139.226.47.229:995
104.243.58.227:443
103.42.86.42:995
86.196.12.21:2222
43.243.215.210:443
220.240.15.200:443
123.3.240.16:6881
103.141.50.79:995
116.74.164.214:443
84.215.202.8:443
119.82.121.87:443
162.248.14.107:443
125.99.76.102:443
94.59.122.53:2222
103.123.223.171:443
178.175.187.254:443
96.56.197.26:2083
217.165.234.249:443
98.147.155.235:443
35.143.97.145:995
112.222.83.147:6881
46.24.47.243:995
184.182.66.109:443
71.78.95.86:995
70.112.206.5:443
76.170.252.153:995
81.229.117.95:2222
72.134.124.16:443
12.172.173.82:20
47.34.30.133:443
67.10.9.125:995
99.230.89.236:2083
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1916-55-0x0000000010000000-0x0000000010024000-memory.dmp
Files
-
1916-55-0x0000000010000000-0x0000000010024000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ