Behavioral task
behavioral1
Sample
620-133-0x0000000001520000-0x0000000001544000-memory.dll
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
620-133-0x0000000001520000-0x0000000001544000-memory.dll
Resource
win10v2004-20240226-en
General
-
Target
620-133-0x0000000001520000-0x0000000001544000-memory.dmp
-
Size
144KB
-
MD5
d5b439628238a3a13de21193fdbebb5b
-
SHA1
b55fcdb67dc299bc920f4f2a4623a002f0f12d46
-
SHA256
d7828ef8690949d656c83390d3a76addf7daf3db45ab071dbd5e5e8a48887622
-
SHA512
d0ff0868fc197b2c6554baef702c54db586e2eedbbbab1798d5d8078f408a1a9ff596f7f7cbed693f37c8cc519518076e59f066208f113b09544e02f07110723
-
SSDEEP
3072:MzwUtG96KAmroClmAyJA9VQATBfPqZzho:EtwLAIouDyJGVQATBHql
Malware Config
Extracted
qakbot
404.909
BB22
1680686988
88.126.94.4:50000
104.35.24.154:443
147.219.4.194:443
105.102.30.255:443
139.226.47.229:995
71.171.83.69:443
45.50.233.214:443
92.154.17.149:2222
59.153.96.4:443
75.109.111.89:443
125.99.76.102:443
47.205.25.170:443
12.172.173.82:995
102.158.82.17:443
92.20.199.185:2222
24.236.90.196:2078
116.74.164.148:443
37.14.229.220:2222
98.37.25.99:443
43.243.215.206:443
84.35.26.14:995
116.72.250.18:443
190.78.69.250:2222
12.172.173.82:2087
90.55.106.37:2222
119.82.123.160:443
202.142.98.62:443
202.142.98.62:995
93.24.192.142:20
27.109.19.90:2078
136.244.25.165:443
50.68.204.71:995
109.50.143.218:2222
12.172.173.82:465
2.237.150.131:2222
77.126.11.114:443
50.68.204.71:443
81.229.117.95:2222
184.153.132.82:443
12.172.173.82:21
73.36.196.11:443
103.87.128.228:443
213.67.139.53:2222
92.186.69.229:2222
172.115.17.50:443
86.98.23.66:443
75.98.154.19:443
69.133.162.35:443
178.175.187.254:443
47.21.51.138:443
109.159.118.65:2222
12.172.173.82:32101
49.245.95.124:2222
89.129.109.27:2222
41.227.217.128:443
85.241.180.94:443
35.143.97.145:995
2.82.8.80:443
83.92.85.93:443
47.34.30.133:443
71.38.155.217:443
50.68.204.71:993
92.1.170.110:995
12.172.173.82:22
76.170.252.153:995
80.13.205.69:2222
50.68.186.195:443
213.91.235.146:443
186.64.87.204:443
174.4.89.3:443
75.143.236.149:443
103.113.68.33:443
198.2.51.242:993
82.122.128.149:2222
71.31.232.65:995
81.150.42.123:443
83.213.192.136:443
59.28.84.65:443
41.96.194.114:443
72.200.109.104:443
122.186.210.254:443
103.144.201.53:2078
90.211.192.113:443
92.97.115.255:2222
112.222.83.147:6881
105.225.50.146:995
103.42.86.42:995
87.243.146.59:443
47.199.241.39:443
12.172.173.82:20
162.248.14.107:443
71.31.100.192:443
84.155.13.118:995
67.10.2.240:995
176.142.207.63:443
70.160.80.210:443
103.111.70.66:443
103.111.70.66:995
92.239.81.124:443
86.130.9.243:2222
72.134.124.16:443
86.45.66.141:2222
161.142.103.5:995
151.51.235.22:443
89.79.229.50:443
86.143.119.184:995
109.154.254.126:2222
92.9.45.20:2222
98.145.23.67:443
87.223.89.244:443
209.225.132.130:443
84.215.202.8:443
197.3.198.241:443
74.66.134.24:443
72.203.216.98:2222
136.232.184.134:995
197.94.95.20:443
87.202.101.164:50000
209.93.207.224:2222
90.93.132.149:2222
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 620-133-0x0000000001520000-0x0000000001544000-memory.dmp
Files
-
620-133-0x0000000001520000-0x0000000001544000-memory.dmp.dll windows:6 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ