General

  • Target

    1312-55-0x00000000003C0000-0x00000000003E4000-memory.dmp

  • Size

    144KB

  • MD5

    830821e5588a0bc67ca850720d1c977c

  • SHA1

    c33c7a76b9cbe550be0171548a479a791646d683

  • SHA256

    3d3afa3144bdfd3880bfaa9c52f9179a96de01b43c6888a7c485036009868f15

  • SHA512

    6697639b254bbf145cca7ead980c82d47f379c55c374776dd937cfae636792b6d3b32aad3d023abf31c1705540aff77c125c13d4363bf3ec0ebe584b3e340cde

  • SSDEEP

    3072:BkrG2QtyJ9eEW3hFCr0AsJJmv520TBfPgy:BGzeEgh4rhsJsvs0TBnL

Malware Config

Extracted

Family

qakbot

Version

404.999

Botnet

notset

Campaign

1681806702

C2

67.10.2.240:995

172.248.42.122:443

12.172.173.82:21

76.86.31.59:443

24.139.11.137:443

74.66.134.24:443

86.178.33.125:2222

198.2.51.242:993

124.246.122.199:2222

50.68.204.71:995

12.172.173.82:465

184.182.66.109:443

105.184.209.7:995

100.6.31.96:443

139.226.47.229:995

175.156.65.126:2222

161.142.104.40:995

122.184.143.85:443

125.99.69.178:443

86.99.49.64:2222

Attributes
  • salt

    SoNuce]ugdiB3c[doMuce2s81*uXmcvP

Signatures

  • Qakbot family
  • Unsigned PE 1 IoCs

    Checks for missing Authenticode signature.

Files

  • 1312-55-0x00000000003C0000-0x00000000003E4000-memory.dmp
    .dll windows:6 windows x86 arch:x86


    Headers

    Sections