General

  • Target

    2444-1-0x00000000000C0000-0x00000000000E4000-memory.dmp

  • Size

    144KB

  • MD5

    529a5a4d555e52b3a1563a12f239cf17

  • SHA1

    ce1786270ac4f3a8753543f07ca314e3e55c9602

  • SHA256

    974e91d003aad9f44e385254da1d2b5904392ed8fe3556b3878f4d2efabe3529

  • SHA512

    9005c7c3d5109668e4d21f0abb9618e16d1a16ff017d7831c1afb96a84ecc2c736d0c6c6bb64643efd3df11ab1198aa9886871167ccf4cfa33a0a54813da4ed3

  • SSDEEP

    3072:6k0K/tDZiUC/rFQ/wWAmJAj+J0sH3jTBfw/EoG5y:I/rCoWdCj+JjH3jTBI/EoG5y

Malware Config

Extracted

Family

qakbot

Version

404.1377

Botnet

snow09

Campaign

1686740620

C2

101.184.155.156:2222

89.79.229.50:443

173.17.45.60:443

124.246.122.199:2222

84.215.202.8:443

122.184.143.86:443

79.168.224.165:2222

151.62.174.154:443

124.122.47.148:443

31.190.240.11:443

92.239.81.124:443

31.53.29.210:2222

172.115.17.50:443

70.28.50.223:2083

64.121.161.102:443

187.199.244.117:32103

91.68.227.219:443

176.142.207.63:443

47.199.241.39:443

89.129.109.27:2222

Signatures

  • Qakbot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 2444-1-0x00000000000C0000-0x00000000000E4000-memory.dmp
    .exe windows:6 windows x86


    Headers

    Sections