Behavioral task
behavioral1
Sample
1120-55-0x0000000010000000-0x0000000010024000-memory.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1120-55-0x0000000010000000-0x0000000010024000-memory.dll
Resource
win10v2004-20230220-en
General
-
Target
1120-55-0x0000000010000000-0x0000000010024000-memory.dmp
-
Size
144KB
-
MD5
002dfffcbb73dafac227997ef66aed16
-
SHA1
aadfe4f8c1bdb2672cad1f37a2498f948c420537
-
SHA256
85008a9ef7ae87546f4d5ff341586a640cd579d009e8735afd7be3fa1d23f812
-
SHA512
561378e3ab40f0373f21cec1e538cba5fcfdf84b310d88f3511b8fa2941b9ef9b16c7144a32406ac66d9ca9ee3cd640351417907aab97420de7f0ad3476f346f
-
SSDEEP
3072:QHgHsJq6uUu9VrVHl8j+YAHJYTVBH88TBffMNkg:FkwUun5lC+9HJwVBH88TB3MNF
Malware Config
Extracted
qakbot
404.1038
BB28
1684145503
74.33.196.114:443
108.190.115.159:443
47.21.51.138:443
76.16.49.134:443
113.11.92.30:443
98.19.234.243:995
197.14.208.59:443
88.126.94.4:50000
24.69.137.232:2222
70.28.50.223:32100
184.176.35.223:2222
12.172.173.82:50001
87.202.101.164:50000
70.28.50.223:2087
75.109.111.89:443
86.130.9.227:2222
12.172.173.82:32101
70.28.50.223:3389
80.12.88.148:2222
174.118.68.176:443
75.98.154.19:443
125.99.69.178:443
96.87.28.170:2222
96.56.197.26:2222
86.140.160.231:2222
86.195.14.72:2222
47.205.25.170:443
103.42.86.42:995
12.172.173.82:465
50.68.204.71:993
173.88.135.179:443
105.101.110.37:443
75.143.236.149:443
70.50.83.139:2222
84.215.202.8:443
84.35.26.14:995
12.172.173.82:21
78.92.133.215:443
31.53.29.198:2222
86.178.33.63:2222
217.44.108.89:2222
100.6.31.96:443
92.239.81.124:443
37.14.229.220:2222
172.115.17.50:443
103.141.50.79:995
105.186.242.203:995
92.1.170.110:995
89.79.229.50:443
200.109.16.12:2222
103.140.174.20:2222
91.75.114.200:443
102.156.218.92:443
91.2.143.185:995
90.165.109.4:2222
85.152.152.46:443
182.185.181.202:995
65.190.242.244:443
122.186.210.254:443
58.162.223.233:443
98.145.23.67:443
41.186.88.38:443
139.226.47.229:995
12.172.173.82:993
197.148.17.17:2078
43.243.215.210:443
178.152.124.169:443
50.68.204.71:443
217.165.234.249:443
116.74.164.93:443
184.153.132.82:443
69.133.162.35:443
162.248.14.107:443
50.68.204.71:995
186.64.67.41:443
89.114.140.100:443
109.50.128.59:2222
12.172.173.82:2087
92.20.204.198:2222
79.26.184.19:443
35.143.97.145:995
161.142.98.36:995
27.109.19.90:2078
174.4.89.3:443
73.29.92.128:443
103.123.223.171:443
173.22.114.208:443
70.160.67.203:443
12.172.173.82:22
47.149.248.80:443
40.134.85.217:443
71.38.155.217:443
86.176.16.18:443
125.99.76.102:443
79.77.142.22:2222
66.191.69.18:995
178.175.187.254:443
76.170.252.153:995
176.142.207.63:443
85.104.98.64:443
87.243.146.59:443
70.28.50.223:2078
76.86.31.59:443
71.78.95.86:995
92.9.45.20:2222
198.2.51.242:993
81.229.117.95:2222
92.98.159.9:2222
202.184.123.13:443
201.244.108.183:995
72.205.104.134:443
50.68.186.195:443
103.87.128.228:443
90.104.151.37:2222
12.172.173.82:20
70.28.50.223:2083
92.27.86.48:2222
157.119.85.203:443
122.184.143.86:443
186.75.103.188:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1120-55-0x0000000010000000-0x0000000010024000-memory.dmp
Files
-
1120-55-0x0000000010000000-0x0000000010024000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 97KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ