General

  • Target

    1040-14-0x0000000000400000-0x000000000052D000-memory.dmp

  • Size

    1.2MB

  • MD5

    2da43796fec77dd13f1b85071f85bb9a

  • SHA1

    4c4a207797728000491c9089ef06b039546c92a2

  • SHA256

    4376aba238a43c0d4745e71aa5f54c3600f1e6a7f8457bef4ac09a6ee3d6b8de

  • SHA512

    89688eb7d23f401b66971e41cd364965fecbade952d3001750a62b87412bea05b63d19640b9ee06922d3b4115966b69f797c4ebde70697d02d71719b3b2d21de

  • SSDEEP

    12288:c6yCZCzPMTA6HNWC4LINSjA/EMGU/SHoEa:VNFtWbjAsMGU/F

Malware Config

Extracted

Family

qakbot

Version

324.142

Botnet

spx133

Campaign

1591267427

C2

49.144.84.21:443

189.159.133.162:995

173.245.152.231:443

77.237.181.212:995

207.255.161.8:2078

76.187.8.160:443

207.255.161.8:2087

98.219.77.197:443

66.222.88.126:995

207.255.161.8:32102

108.58.9.238:995

47.152.210.233:443

1.40.42.4:443

188.27.71.163:443

82.127.193.151:2222

104.50.141.139:995

67.83.54.76:2222

86.126.97.183:2222

73.94.229.115:443

47.35.182.97:443

Signatures

  • Qakbot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1040-14-0x0000000000400000-0x000000000052D000-memory.dmp
    .exe windows:5 windows x86


    Headers

    Sections