Behavioral task
behavioral1
Sample
1704-55-0x0000000010000000-0x0000000010024000-memory.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1704-55-0x0000000010000000-0x0000000010024000-memory.dll
Resource
win10v2004-20230220-en
General
-
Target
1704-55-0x0000000010000000-0x0000000010024000-memory.dmp
-
Size
144KB
-
MD5
b6f1f4a546280fa3af06e0ece595b51c
-
SHA1
0f1c01eee3cdec7f9513b75d4db3934ce77d0a86
-
SHA256
8813d68eda34235a89118e3ca82c867b8351294f1b13db31462a4d52ddd965e5
-
SHA512
1959b91b7b436b6b33c27bd92ff9e15594a176efe53ecdb8306a4b71d873829a78cc04e209d13ab9ab1287481e33edcebefec1b06cdf24a6dc6b74913640f14d
-
SSDEEP
3072:AHgHsJq6uUu9VrVHl8j+YAHJYTVBHS8TBffMN6g:1kwUun5lC+9HJwVBHS8TB3MNz
Malware Config
Extracted
qakbot
404.1038
obama262
1683720116
197.2.238.177:443
78.130.215.67:443
82.127.153.75:2222
96.56.197.26:2083
89.114.140.100:443
2.237.150.131:2222
69.133.162.35:443
73.29.92.128:443
70.160.67.203:443
79.77.142.22:2222
73.207.160.219:443
12.172.173.82:2087
103.212.19.254:995
188.83.251.100:443
173.61.50.155:3389
87.223.95.250:443
66.180.226.58:2222
84.108.200.161:443
81.224.201.143:2222
70.28.50.223:1194
85.53.128.200:3389
213.197.72.89:443
70.28.50.223:2078
103.140.174.20:2222
85.105.207.126:443
12.172.173.82:22
178.175.187.254:443
31.190.210.188:443
41.227.211.88:443
99.230.89.236:2083
85.104.105.67:443
201.208.135.167:2222
66.191.69.18:995
27.109.19.90:2078
76.170.252.153:995
68.229.150.95:443
24.150.188.234:443
90.165.109.4:2222
139.226.47.229:995
94.204.213.230:443
178.167.139.197:995
173.178.151.233:443
171.96.192.178:443
217.165.234.249:443
200.93.26.107:2222
67.70.122.196:2222
151.55.186.41:443
50.5.45.204:443
92.27.86.48:2222
213.91.235.146:443
71.78.95.86:995
92.9.45.20:2222
2.49.63.193:2222
81.229.117.95:2222
201.244.108.183:995
198.2.51.242:993
12.172.173.82:20
105.184.99.42:995
103.123.223.171:443
70.28.50.223:2083
184.182.66.109:443
70.112.206.5:443
122.184.143.86:443
72.134.124.16:443
99.230.89.236:2078
157.119.85.203:443
90.104.151.37:2222
147.219.4.194:443
103.141.50.79:995
47.34.30.133:443
71.38.155.217:443
85.84.222.49:443
88.126.94.4:50000
188.28.72.118:443
41.186.88.38:443
66.35.125.74:2222
119.82.121.87:443
67.10.9.125:995
149.74.159.67:2222
103.144.201.56:2078
114.143.176.236:443
31.53.29.198:2222
217.44.108.89:2222
81.156.1.223:443
50.68.186.195:443
92.188.241.102:443
47.132.248.132:443
47.205.25.170:443
12.172.173.82:465
12.172.173.82:995
75.143.236.149:443
14.192.241.76:995
94.200.183.66:2222
84.35.26.14:995
86.130.9.208:2222
151.65.214.218:443
174.4.89.3:443
47.21.51.138:443
24.69.137.232:2222
76.16.49.134:443
64.121.161.102:443
98.19.224.125:995
87.202.101.164:50000
78.192.109.105:2222
86.140.160.231:2222
74.92.243.115:50000
73.41.215.237:443
83.92.85.93:443
75.109.111.89:443
75.98.154.19:443
69.119.123.159:2222
2.50.16.167:995
12.172.173.82:21
50.68.204.71:993
70.28.50.223:3389
12.172.173.82:32101
173.88.135.179:443
67.219.197.94:443
109.159.119.82:2222
76.64.99.251:2222
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1704-55-0x0000000010000000-0x0000000010024000-memory.dmp
Files
-
1704-55-0x0000000010000000-0x0000000010024000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ