DllRegisterServer
General
-
Target
455253_c2ba065654f13612ae63bca7f972ea91c6fe97291caeaaa3a28a180fb1912b3a.zip
-
Size
237KB
-
MD5
2739602af9de4e37007f49887c17dc8b
-
SHA1
9c51c995d91ae838349a35746ed173e7fdfa4df8
-
SHA256
5b1928e0f4afd659d9a1aa169ba9e794e57251725a8674af205392d3a2f255b5
-
SHA512
62eff2f78c0e999b296c18f99977c9c6e7d68bb9ee7a92db9069a2bc6f4e76536711d68123db6676061a3b351e75f29c841c145b016b44ca56021ca1d51817a5
-
SSDEEP
6144:fr/nfFCyA5pomBssfsvBERD4fe9iwVmtuVU0UJ7I4h7swR2:RDA0mBsgxtyyNmtuVU0Q7rh7swI
Malware Config
Extracted
qakbot
403.573
AA
1649660679
41.228.22.180:443
47.23.89.62:995
176.67.56.94:443
103.107.113.120:443
148.64.96.100:443
47.180.172.159:443
181.118.183.98:443
140.82.49.12:443
103.87.95.133:2222
96.21.251.127:2222
197.167.62.14:993
46.107.48.202:443
24.43.99.75:443
172.115.177.204:2222
80.11.74.81:2222
66.98.42.102:443
75.99.168.194:61201
173.174.216.62:443
45.9.20.200:443
39.41.158.185:995
187.207.48.194:61202
41.84.237.10:995
93.48.80.198:995
105.226.83.196:995
144.202.2.175:443
45.76.167.26:995
144.202.3.39:443
144.202.3.39:995
140.82.63.183:443
45.63.1.12:995
140.82.63.183:995
144.202.2.175:995
45.63.1.12:443
149.28.238.199:443
45.76.167.26:443
149.28.238.199:995
47.180.172.159:50010
71.13.93.154:2222
86.98.33.141:443
31.35.28.29:443
113.11.89.165:995
175.145.235.37:443
117.248.109.38:21
94.59.138.62:2222
32.221.224.140:995
5.95.58.211:2087
81.215.196.174:443
176.88.238.122:995
94.59.138.62:1194
92.132.172.197:2222
70.46.220.114:443
78.87.206.213:995
197.89.108.252:443
39.44.144.159:995
176.205.119.81:2078
91.177.173.10:995
72.76.94.99:443
24.178.196.158:2222
1.161.71.109:995
172.114.160.81:995
173.21.10.71:2222
1.161.71.109:443
86.97.11.43:443
217.128.122.65:2222
86.98.33.141:995
203.122.46.130:443
89.211.181.64:2222
37.186.54.254:995
86.98.208.214:2222
83.110.75.97:2222
202.134.152.2:2222
120.150.218.241:995
45.46.53.140:2222
180.129.102.214:995
217.164.210.192:443
217.165.147.83:993
84.241.8.23:32103
180.183.128.80:2222
74.15.2.252:2222
76.70.9.169:2222
47.23.89.62:993
75.113.214.234:2222
208.107.221.224:443
76.169.147.192:32103
190.73.3.148:2222
76.69.155.202:2222
96.29.208.97:443
108.60.213.141:443
75.99.168.194:443
182.191.92.203:995
73.151.236.31:443
38.70.253.226:2222
39.52.75.201:995
121.74.167.191:995
201.211.64.196:2222
71.74.12.34:443
191.99.191.28:443
85.246.82.244:443
101.50.103.193:995
182.253.189.74:2222
67.209.195.198:443
90.120.65.153:2078
37.34.253.233:443
96.37.113.36:993
181.62.0.59:443
41.38.167.179:995
197.205.127.234:443
45.241.232.25:995
185.69.144.209:443
2.50.137.197:443
73.67.152.98:2222
76.25.142.196:443
125.168.47.127:2222
201.145.189.252:443
109.12.111.14:443
102.182.232.3:995
72.12.115.90:22
47.156.191.217:443
174.69.215.101:443
70.51.138.126:2222
186.105.121.166:443
179.158.105.44:443
94.36.195.250:2222
109.228.220.196:443
120.61.2.95:443
103.88.226.30:443
103.139.243.207:990
68.204.7.158:443
196.233.79.3:80
39.57.76.82:995
187.250.114.15:443
103.246.242.202:443
190.252.242.69:443
5.32.41.45:443
100.1.108.246:443
72.252.201.34:995
191.17.223.93:32101
40.134.246.185:995
187.102.135.142:2222
191.34.199.129:443
181.208.248.227:443
138.204.24.70:443
209.197.176.40:995
42.235.146.7:2222
82.152.39.39:443
41.230.62.211:993
31.48.166.122:2078
187.251.132.144:22
143.0.34.185:443
88.228.250.126:443
-
salt
jHxastDcds)oMc=jvh7wdUhxcsdt2
Signatures
-
Qakbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/c2ba065654f13612ae63bca7f972ea91c6fe97291caeaaa3a28a180fb1912b3a
Files
-
455253_c2ba065654f13612ae63bca7f972ea91c6fe97291caeaaa3a28a180fb1912b3a.zip.zip
Password: infected
-
c2ba065654f13612ae63bca7f972ea91c6fe97291caeaaa3a28a180fb1912b3a.dll regsvr32 windows:6 windows x86 arch:x86
8e5fe034ddea581be35472bb9e09c763
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
oleaut32
VariantClear
VariantChangeType
VariantInit
SafeArrayGetLBound
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayDestroy
SysAllocString
SysFreeString
shlwapi
PathFindExtensionW
PathFindFileNameW
PathIsUNCW
PathStripToRootW
PathRemoveFileSpecW
user32
GetActiveWindow
CallNextHookEx
GetKeyState
GetMessageW
UnhookWindowsHookEx
EndPaint
BeginPaint
DrawTextW
GetWindowDC
DrawTextExW
GetDC
GetSysColor
LoadCursorW
GetMenuItemID
GetMenuItemCount
DispatchMessageW
DestroyMenu
CreateWindowExA
UnregisterClassA
RegisterClassExA
SendDlgItemMessageA
CharUpperBuffA
PostQuitMessage
PeekMessageW
ValidateRect
TranslateMessage
SetWindowsHookExW
GetSubMenu
GetSystemMetrics
CharUpperW
EnableWindow
SendMessageW
InvalidateRect
UpdateWindow
KillTimer
SetTimer
RegisterWindowMessageW
ReleaseDC
GetSysColorBrush
CharUpperBuffW
RealChildWindowFromPoint
SetMenuItemBitmaps
DefWindowProcW
EnumDisplayMonitors
GetClassInfoW
GetMonitorInfoW
MapWindowPoints
GetClientRect
SystemParametersInfoW
DeferWindowPos
GetWindowRect
BeginDeferWindowPos
CopyRect
IsChild
GetClassNameW
EndDeferWindowPos
SetRectEmpty
GetWindow
GetFocus
SetWindowPos
SetWindowTextW
ShowWindow
IsDialogMessageW
GetDlgCtrlID
SetFocus
SetWindowLongW
GetWindowTextW
GetWindowLongW
DestroyWindow
GetMenuCheckMarkDimensions
SetMenuItemInfoW
SetActiveWindow
EndDialog
IsWindow
IsWindowEnabled
GetDlgItem
GetDesktopWindow
CreateDialogIndirectParamW
GetParent
GetNextDlgTabItem
TabbedTextOutW
GrayStringW
ScreenToClient
ClientToScreen
MessageBoxW
GetLastActivePopup
GetWindowThreadProcessId
IsIconic
SetForegroundWindow
PtInRect
GetClassInfoExW
GetClassLongW
LoadBitmapW
LoadIconW
SetPropW
GetMessageTime
WinHelpW
SetMenu
GetForegroundWindow
GetTopWindow
RegisterClassW
IsMenu
RedrawWindow
GetCapture
GetScrollPos
RemovePropW
CreateWindowExW
MonitorFromWindow
GetPropW
GetMenu
PostMessageW
CallWindowProcW
GetMessagePos
AdjustWindowRectEx
EnableMenuItem
CheckMenuItem
shell32
ShellExecuteW
ole32
CoSetProxyBlanket
CoCreateGuid
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
CoInitializeEx
CoInitializeSecurity
msvcrt
_errno
free
wcsncpy_s
ftell
__doserrno
_get_osfhandle
ferror
fflush
clearerr_s
fclose
_fdopen
fputws
fseek
_fileno
fwrite
fgetws
feof
_mktime64
wcsnlen
_vsnprintf
_ftol2_sse
atexit
_expand
strncpy
memcpy
memset
memcmp
qsort
_snprintf
_strtoi64
memchr
_time64
strchr
strtod
localeconv
fread
_open_osfhandle
__CxxFrameHandler3
wcscpy_s
_vsnwprintf
_msize
malloc
_wcsicmp
wcspbrk
wcsspn
wcsrchr
wcscspn
wcschr
wcscat_s
_purecall
realloc
atol
_wcsicoll
memmove
advapi32
RegCreateKeyExW
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegEnumValueW
RegDeleteKeyW
kernel32
EncodePointer
GetSystemDirectoryW
LoadLibraryW
SetThreadPriority
GetCurrentThreadId
lstrcpynW
lstrcatW
lstrcpyW
GetFileSizeEx
SetFileAttributesW
GetFileAttributesExW
FileTimeToSystemTime
FileTimeToLocalFileTime
SystemTimeToTzSpecificLocalTime
GetFileTime
CompareStringW
GlobalDeleteAtom
GlobalGetAtomNameW
lstrcmpA
GlobalFindAtomW
FreeLibrary
lstrcmpW
LoadLibraryA
lstrcmpiA
GetSystemTimeAsFileTime
HeapCreate
GlobalFlags
FindNextFileW
GetExitCodeProcess
GetModuleHandleA
GetWindowsDirectoryW
VerifyVersionInfoW
VerSetConditionMask
K32GetModuleFileNameExW
GlobalReAlloc
LocalReAlloc
TlsGetValue
TlsAlloc
LocalAlloc
TlsSetValue
GlobalHandle
GetVersionExW
GetDriveTypeW
GetFileAttributesW
GetProcessId
IsDebuggerPresent
lstrcatA
GetVersionExA
GetSystemInfo
lstrcpynA
SwitchToThread
GetTickCount
ReadFile
SizeofResource
GetVolumeInformationW
FindFirstFileW
HeapFree
EnterCriticalSection
GetFullPathNameW
GetCurrentProcess
WriteFile
GetModuleFileNameW
LockFile
LeaveCriticalSection
SetFilePointer
SetEndOfFile
InitializeCriticalSectionEx
FindClose
CreateFileW
DuplicateHandle
GetLastError
LockResource
DeleteFileW
CloseHandle
LoadResource
FindResourceW
HeapAlloc
DecodePointer
UnlockFile
GetProcAddress
GetFileSize
DeleteCriticalSection
GetModuleHandleW
lstrcmpiW
MoveFileW
LoadLibraryExW
FlushFileBuffers
InitializeCriticalSection
GetOEMCP
CreateMutexW
MultiByteToWideChar
GetCurrentThread
GetCurrentProcessId
CreateDirectoryW
GlobalAddAtomW
FormatMessageW
GlobalAlloc
GlobalFree
GlobalLock
LocalFree
GlobalUnlock
MulDiv
WideCharToMultiByte
OutputDebugStringW
DisconnectNamedPipe
gdi32
ExtTextOutW
PtVisible
Escape
CreateBitmap
SetMapMode
DeleteDC
RestoreDC
SetBkColor
GetObjectW
SetViewportOrgEx
ScaleViewportExtEx
CreatePen
SetTextColor
TextOutW
CreatePatternBrush
GetDeviceCaps
CreateSolidBrush
SetViewportExtEx
CreateCompatibleBitmap
CreateDIBitmap
GetTextCharsetInfo
EnumFontFamiliesW
GetTextMetricsW
CreateFontIndirectW
BitBlt
SaveDC
ScaleWindowExtEx
SelectObject
CreateCompatibleDC
RectVisible
GetStockObject
GetClipBox
SetWindowExtEx
OffsetViewportOrgEx
DeleteObject
comdlg32
ChooseColorW
GetSaveFileNameW
GetOpenFileNameW
GetFileTitleW
oleacc
CreateStdAccessibleObject
LresultFromObject
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
Exports
Exports
Sections
.text Size: 281KB - Virtual size: 281KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ