Behavioral task
behavioral1
Sample
1616-55-0x00000000004A0000-0x00000000004C4000-memory.dll
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1616-55-0x00000000004A0000-0x00000000004C4000-memory.dll
Resource
win10v2004-20230220-en
General
-
Target
1616-55-0x00000000004A0000-0x00000000004C4000-memory.dmp
-
Size
144KB
-
MD5
07b0f64c111380dec93f82c6a8b7c910
-
SHA1
c57d3068c569c6b8c4bc2470d0db7431a673dbbc
-
SHA256
4f4da70d869b82980861955e4f6fdd77aca77482708ab517b4adbf6ae97271eb
-
SHA512
f2b7bb95b2e77c9c19de0405d4636394011d8473b33208fdbe1dd3fb85058a3a7da496aa69a08a075220b7df158fd371d368fa849d4f93b7fd69cf330707636c
-
SSDEEP
3072:GCfXwN8O5iVEe2e/n+RXA3Jh0fHkTBfPxJzho:hfcF5iee2knOQ3J+fHkTBHxV
Malware Config
Extracted
qakbot
404.909
BB22
1680688614
209.93.207.224:2222
90.93.132.149:2222
109.11.175.42:2222
12.172.173.82:993
86.195.14.72:2222
82.121.195.187:2222
88.122.133.88:32100
86.154.216.221:2222
91.82.133.190:443
197.3.198.241:443
70.112.206.5:443
12.172.173.82:50001
103.123.223.141:443
103.141.50.102:995
201.244.108.183:995
183.87.163.165:443
76.178.148.107:2222
96.87.28.170:2222
76.80.180.154:993
92.189.214.236:2222
95.60.243.64:995
80.12.88.148:2222
86.225.214.138:2222
90.165.109.4:2222
88.126.94.4:50000
104.35.24.154:443
147.219.4.194:443
105.102.30.255:443
139.226.47.229:995
71.171.83.69:443
45.50.233.214:443
92.154.17.149:2222
59.153.96.4:443
75.109.111.89:443
125.99.76.102:443
47.205.25.170:443
12.172.173.82:995
102.158.82.17:443
92.20.199.185:2222
24.236.90.196:2078
116.74.164.148:443
37.14.229.220:2222
98.37.25.99:443
43.243.215.206:443
84.35.26.14:995
116.72.250.18:443
190.78.69.250:2222
12.172.173.82:2087
90.55.106.37:2222
119.82.123.160:443
202.142.98.62:443
202.142.98.62:995
93.24.192.142:20
27.109.19.90:2078
136.244.25.165:443
50.68.204.71:995
109.50.143.218:2222
12.172.173.82:465
2.237.150.131:2222
77.126.11.114:443
50.68.204.71:443
81.229.117.95:2222
184.153.132.82:443
12.172.173.82:21
73.36.196.11:443
103.87.128.228:443
213.67.139.53:2222
92.186.69.229:2222
172.115.17.50:443
86.98.23.66:443
75.98.154.19:443
69.133.162.35:443
178.175.187.254:443
47.21.51.138:443
109.159.118.65:2222
12.172.173.82:32101
49.245.95.124:2222
89.129.109.27:2222
41.227.217.128:443
85.241.180.94:443
35.143.97.145:995
2.82.8.80:443
83.92.85.93:443
47.34.30.133:443
71.38.155.217:443
50.68.204.71:993
92.1.170.110:995
12.172.173.82:22
76.170.252.153:995
80.13.205.69:2222
50.68.186.195:443
213.91.235.146:443
186.64.87.204:443
174.4.89.3:443
75.143.236.149:443
103.113.68.33:443
198.2.51.242:993
82.122.128.149:2222
71.31.232.65:995
81.150.42.123:443
83.213.192.136:443
59.28.84.65:443
41.96.194.114:443
72.200.109.104:443
122.186.210.254:443
103.144.201.53:2078
90.211.192.113:443
92.97.115.255:2222
112.222.83.147:6881
105.225.50.146:995
103.42.86.42:995
87.243.146.59:443
47.199.241.39:443
12.172.173.82:20
162.248.14.107:443
71.31.100.192:443
84.155.13.118:995
67.10.2.240:995
176.142.207.63:443
70.160.80.210:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1616-55-0x00000000004A0000-0x00000000004C4000-memory.dmp
Files
-
1616-55-0x00000000004A0000-0x00000000004C4000-memory.dmp.dll windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ