Behavioral task
behavioral1
Sample
2004-54-0x0000000010000000-0x0000000010023000-memory.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2004-54-0x0000000010000000-0x0000000010023000-memory.dll
Resource
win10v2004-20240226-en
General
-
Target
2004-54-0x0000000010000000-0x0000000010023000-memory.dmp
-
Size
140KB
-
MD5
4f51dae1c6181e10574b27171d5efdd5
-
SHA1
59538604a6ea80773da78d50f2b0fad9eef3a98f
-
SHA256
9cdb8dcc15ca3714a9bf53d8d316bca66643f75e4f40ca15895c7136fe7bdc0e
-
SHA512
a38dbc12bc4e3658477bcc3658befc297f1ae744998d5b273d5cf382771fe7af084e478c28ad4b4d11f691c711fe1281875aae3f360b516f2297efa27b04196f
-
SSDEEP
3072:MjPR4nxKRttVbYKAk67CERzMRAPJyDnoMTBfPuq:MHRxbYK0CEMaPJynoMTBHN
Malware Config
Extracted
qakbot
404.263
obama243
1678889958
91.196.69.245:443
90.104.22.28:2222
37.14.229.220:2222
88.126.94.4:50000
92.159.173.52:2222
122.184.143.85:443
85.61.165.153:2222
86.195.14.72:2222
92.154.17.149:2222
47.203.229.168:443
98.187.21.2:443
70.51.152.61:2222
91.68.227.219:443
92.154.45.81:2222
88.122.133.88:32100
98.147.155.235:443
91.254.229.61:443
213.31.90.183:2222
174.118.36.28:443
197.14.148.149:443
31.48.18.52:443
104.35.24.154:443
85.84.119.210:993
97.93.192.2:2083
208.180.17.32:2222
109.11.175.42:2222
190.28.116.106:443
73.36.196.11:443
190.218.125.145:443
12.172.173.82:2087
103.12.133.134:2222
82.127.172.214:2222
103.169.83.89:443
176.202.46.81:443
201.171.239.42:443
184.189.41.80:443
47.34.30.133:443
76.170.252.153:995
86.130.9.213:2222
83.92.85.93:443
76.80.180.154:995
85.241.180.94:443
2.82.8.80:443
24.117.237.157:443
35.143.97.145:995
73.161.178.173:443
45.243.162.199:995
184.176.110.61:61202
174.93.5.232:2222
92.186.69.229:2222
103.141.50.102:995
81.229.117.95:2222
68.109.240.71:443
84.216.198.124:6881
50.68.204.71:995
103.252.7.231:443
23.251.92.171:2222
87.220.204.179:2222
103.123.223.132:443
45.50.233.214:443
71.65.145.108:443
49.245.82.178:2222
12.172.173.82:32101
70.55.187.152:2222
83.7.55.212:443
72.194.232.94:443
64.237.245.195:443
47.196.225.236:443
72.88.245.71:443
76.71.137.91:2222
24.187.145.201:2222
65.94.87.200:2222
178.175.187.254:443
136.35.241.159:443
87.202.101.164:50000
47.16.77.194:2222
67.193.6.69:443
12.172.173.82:465
72.80.7.6:50003
109.218.83.111:2222
184.153.132.82:443
103.231.216.238:443
93.147.134.85:443
180.151.104.240:443
73.165.119.20:443
69.133.162.35:443
12.172.173.82:20
162.248.14.107:443
108.190.203.42:995
89.32.159.107:995
50.68.186.195:443
50.68.204.71:443
74.92.243.113:50000
213.67.255.57:2222
89.129.109.27:2222
174.4.89.3:443
12.172.173.82:990
198.2.51.242:993
59.28.84.65:443
46.10.198.134:443
80.13.205.69:2222
78.16.156.188:443
84.35.26.14:995
24.206.27.39:443
73.214.105.238:443
187.199.103.21:32103
41.227.92.194:995
173.178.151.233:443
50.68.204.71:993
75.143.236.149:443
12.172.173.82:21
174.104.184.149:443
80.42.186.99:2222
72.203.216.98:2222
2.51.44.191:2222
27.99.34.220:2222
193.253.100.236:2222
197.14.217.175:443
92.27.86.48:2222
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2004-54-0x0000000010000000-0x0000000010023000-memory.dmp
Files
-
2004-54-0x0000000010000000-0x0000000010023000-memory.dmp.dll windows:6 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ