General

  • Target

    1616-85-0x0000000000140000-0x0000000000164000-memory.dmp

  • Size

    144KB

  • MD5

    328345dd2bcb936b77a373e21a597e45

  • SHA1

    f2fc2a4bcd64f096855efcf41d85e078a010daa2

  • SHA256

    3fb8b05707bfbc5bc59d74f4066feb78eec8efbb324942174cd851d16c852ce5

  • SHA512

    5d918c2ade9fcc07d29459c5fa67cde3d3908867775fb5437354bddd8e4539d4060e7a84897ae0e732e323306a41a773c2c93da3cf12a151fbfb2b558dcb3d6b

  • SSDEEP

    3072:xyj5Jfa4eau2hlSwAifJSW1Xn0TBfQeuLe:aa4Y2rSFifJV1Xn0TBoey

Score
10/10

Malware Config

Extracted

Family

qakbot

Version

404.1320

Botnet

BB30

Campaign

1685433861

C2

12.172.173.82:50001

178.175.187.254:443

65.95.141.84:2222

205.237.67.69:995

83.110.223.61:443

193.253.100.236:2222

27.0.48.233:443

102.159.188.125:443

71.38.155.217:443

58.186.75.42:443

76.178.148.107:2222

70.28.50.223:2087

114.143.176.236:443

51.14.29.227:2222

59.28.84.65:443

173.88.135.179:443

103.144.201.56:2078

96.87.28.170:2222

105.186.128.181:995

176.142.207.63:443

Signatures

  • Qakbot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1616-85-0x0000000000140000-0x0000000000164000-memory.dmp
    .dll windows x86


    Headers

    Sections