General

  • Target

    1592-83-0x0000000000150000-0x0000000000174000-memory.dmp

  • Size

    144KB

  • MD5

    2708a8e4ab72c9169739d941d734348e

  • SHA1

    0923952e6a0dc4e973c27ef0071c65f300313a6d

  • SHA256

    5b49f0d0e6fab814d688b8dbb1692a7c9c45bd278ad348d053dd056788e7b66b

  • SHA512

    c84105127c80d2de2976bd8ce3fafc0a0414385aa4e0a63ae14acb38cc155f346cc9174fa503006b1e8b8634fa9620fd732614ec8ab14c114b5f7040bc701401

  • SSDEEP

    3072:Gz+RS+Cmyw5yFQC3x61e6RdAr9JDYhdoTBfAvoLVr:o+543x61zR+r9J8hdoTB4vI

Malware Config

Extracted

Family

qakbot

Version

404.1346

Botnet

obama266

Campaign

1685611378

C2

24.234.220.88:990

70.28.50.223:2078

96.56.197.26:2083

103.123.223.133:443

83.249.198.100:2222

199.27.66.213:443

90.104.151.37:2222

94.204.202.106:443

72.205.104.134:443

65.95.141.84:2222

82.131.141.209:443

77.126.99.230:443

71.38.155.217:443

205.237.67.69:995

84.215.202.8:443

24.234.220.88:465

76.178.148.107:2222

116.74.163.130:443

70.28.50.223:2087

147.147.30.126:2222

Signatures

  • Qakbot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1592-83-0x0000000000150000-0x0000000000174000-memory.dmp
    .dll windows x86


    Headers

    Sections