General

  • Target

    1752-55-0x00000000001E0000-0x0000000000204000-memory.dmp

  • Size

    144KB

  • MD5

    4e2a51577dd0dcb2fecc6d9b91dc3e8c

  • SHA1

    2d23eb4c2a2689ee6436277f217cb7076d4f0d6f

  • SHA256

    7aad4843a642e66f19d3865b95a7ec877853ce1799e745e7e593fc8ad493015c

  • SHA512

    88ecd15168420da28da5e5125d59007585a063bd739911a01c8deefbc026b257a0edab429d53dbc5c83f370096e8b59fc81c90ced680632ed3956d093d455027

  • SSDEEP

    3072:BKs0e5fJRocyK1cZhbcjAioJaY7TcTBfwuX:HJRR5cXbcEioJV7TcTBou

Malware Config

Extracted

Family

qakbot

Version

404.1358

Botnet

obama267

Campaign

1686127648

C2

161.142.100.114:995

116.75.63.15:443

125.99.76.102:443

93.187.148.45:443

79.168.224.165:2222

31.53.29.216:2222

103.123.223.133:443

62.35.230.21:995

124.149.143.189:2222

109.50.149.241:2222

86.222.101.244:2222

45.62.70.33:443

24.234.220.88:995

201.244.108.183:995

190.75.134.240:2222

103.212.19.254:995

184.182.66.109:443

64.121.161.102:443

178.175.187.254:443

94.59.123.30:2222

Signatures

  • Qakbot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1752-55-0x00000000001E0000-0x0000000000204000-memory.dmp
    .dll windows x86


    Headers

    Sections