General

  • Target

    1704-55-0x0000000010000000-0x0000000010024000-memory.dmp

  • Size

    144KB

  • MD5

    b6f1f4a546280fa3af06e0ece595b51c

  • SHA1

    0f1c01eee3cdec7f9513b75d4db3934ce77d0a86

  • SHA256

    8813d68eda34235a89118e3ca82c867b8351294f1b13db31462a4d52ddd965e5

  • SHA512

    1959b91b7b436b6b33c27bd92ff9e15594a176efe53ecdb8306a4b71d873829a78cc04e209d13ab9ab1287481e33edcebefec1b06cdf24a6dc6b74913640f14d

  • SSDEEP

    3072:AHgHsJq6uUu9VrVHl8j+YAHJYTVBHS8TBffMN6g:1kwUun5lC+9HJwVBHS8TB3MNz

Malware Config

Extracted

Family

qakbot

Version

404.1038

Botnet

obama262

Campaign

1683720116

C2

197.2.238.177:443

78.130.215.67:443

82.127.153.75:2222

96.56.197.26:2083

89.114.140.100:443

2.237.150.131:2222

69.133.162.35:443

73.29.92.128:443

70.160.67.203:443

79.77.142.22:2222

73.207.160.219:443

12.172.173.82:2087

103.212.19.254:995

188.83.251.100:443

173.61.50.155:3389

87.223.95.250:443

66.180.226.58:2222

84.108.200.161:443

81.224.201.143:2222

70.28.50.223:1194

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

  • Qakbot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1704-55-0x0000000010000000-0x0000000010024000-memory.dmp
    .dll windows x86


    Headers

    Sections