Behavioral task
behavioral1
Sample
2008-54-0x0000000000170000-0x0000000000194000-memory.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2008-54-0x0000000000170000-0x0000000000194000-memory.dll
Resource
win10v2004-20240226-en
General
-
Target
2008-54-0x0000000000170000-0x0000000000194000-memory.dmp
-
Size
144KB
-
MD5
67d313a543e5e6f0108c724b84d5732e
-
SHA1
f5bc15a3fc36a5bb814c1e99b7df1b61ba74f46e
-
SHA256
d436fea496c2c26b861f2b581b6f230a44f6e6d0afa2b09a75a803785ba68748
-
SHA512
c8e7794850c6fee32c7eda19b84848226a5e87cd3a541c0dbba9116da231bb558eb86b5d658620612c09c14d3c41ca518bbe898e7f9a6f99bd178522b2b8226b
-
SSDEEP
3072:JHWOa07CDy/7qsE9nGA1JUTFr4TBf//Wpn2d:4O/msEpj1JQFr4TB3
Malware Config
Extracted
qakbot
404.919
obama251
1681297615
96.87.28.170:2222
74.92.243.115:50000
75.109.111.89:443
157.119.85.203:443
201.244.108.183:995
86.130.9.222:2222
71.171.83.69:443
68.173.170.110:8443
47.205.25.170:443
92.239.81.124:443
172.248.42.122:443
71.38.155.217:443
172.90.139.138:2222
12.172.173.82:50001
92.149.250.113:2222
12.172.173.82:22
81.101.185.146:443
75.149.21.157:443
12.172.173.82:2087
78.130.215.67:443
89.129.109.27:2222
76.80.180.154:993
92.189.214.236:2222
186.64.67.61:443
78.159.145.17:995
78.16.207.80:443
86.225.214.138:2222
88.126.94.4:50000
109.218.12.137:2222
76.64.99.251:2222
176.142.207.63:443
103.111.70.66:995
83.77.208.166:2222
27.99.32.26:2222
2.36.64.159:2078
92.27.86.48:2222
81.147.181.139:443
86.188.22.217:443
109.154.254.126:2222
136.175.69.147:443
92.20.204.198:2222
107.146.12.26:2222
114.143.176.235:443
103.113.68.33:443
12.172.173.82:21
73.36.196.11:443
50.68.204.71:995
12.172.173.82:995
12.172.173.82:465
190.78.69.250:2222
50.5.45.204:443
41.186.88.38:443
151.65.213.208:443
184.182.66.109:443
86.195.14.72:2222
180.156.215.130:995
70.28.50.223:32100
86.154.216.221:2222
80.3.209.218:443
67.10.2.240:995
80.12.88.148:2222
37.14.229.220:2222
47.34.30.133:443
92.1.170.110:995
95.242.101.251:995
81.229.117.95:2222
103.123.223.141:443
23.30.22.225:995
92.154.17.149:2222
182.185.159.137:995
76.86.31.59:443
83.114.60.6:2222
101.184.134.98:2222
23.30.22.225:993
104.35.24.154:443
85.2.185.70:2222
14.192.241.76:995
47.196.225.236:443
78.92.133.215:443
176.202.45.209:443
174.118.63.123:443
84.35.26.14:995
86.171.191.31:443
103.141.50.79:995
213.67.139.53:2222
172.115.17.50:443
198.2.51.242:993
69.133.162.35:443
58.162.223.233:443
91.169.12.198:32100
47.21.51.138:443
35.143.97.145:995
12.172.173.82:32101
64.121.161.102:443
70.28.50.223:1194
49.245.95.124:2222
70.28.50.223:3389
65.190.242.244:443
102.158.69.237:443
72.205.104.134:443
103.42.86.42:995
108.32.72.145:443
70.28.50.223:2087
24.236.90.196:2078
14.200.181.108:443
91.165.188.74:50000
122.184.143.83:443
78.192.109.105:2222
50.68.204.71:443
161.142.103.5:995
213.91.235.146:443
95.60.243.61:995
50.68.204.71:993
72.134.124.16:443
71.31.232.65:995
99.228.131.116:2222
50.68.186.195:443
90.4.110.221:2222
125.99.76.102:443
75.143.236.149:443
-
salt
SoNuce]ugdiB3c[doMuce2s81*uXmcvP
Signatures
-
Qakbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 2008-54-0x0000000000170000-0x0000000000194000-memory.dmp
Files
-
2008-54-0x0000000000170000-0x0000000000194000-memory.dmp.dll windows:6 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ