Behavioral task
behavioral1
Sample
1036-55-0x0000000010000000-0x0000000010024000-memory.dll
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1036-55-0x0000000010000000-0x0000000010024000-memory.dll
Resource
win10v2004-20240226-en
General
-
Target
1036-55-0x0000000010000000-0x0000000010024000-memory.dmp
-
Size
144KB
-
MD5
ebb4f4cd3d168685203580d9054e4fdf
-
SHA1
60247c8a39f4760ec858c4fed7d1af0cabcc0f85
-
SHA256
c65356d5b75f2ef39b1aa1104a51ede11e285f4b66e392fe07aa4bbd8266321f
-
SHA512
530c8ef12e80a04bb193c5ed48a4048156924b2f27a04ee8b5017119568c97a2d9d7d49452734fcd6a67f701394864348164fbf70ae8d3ac8b2e28e9d727a46a
-
SSDEEP
3072:VnPYcZtZHhf+pE90L6+j5zZCb+dJAC8nJxmefH8cTBfwFy1bWeMhM:5Vh2pE90L6mzZCSdCdnJsefccTBIFwCK
Malware Config
Extracted
qakbot
404.1405
obama271
1687438904
70.28.50.223:2083
103.141.50.79:995
184.182.66.109:443
122.184.143.82:443
91.254.145.252:443
37.14.229.220:2222
64.229.117.208:2222
77.126.99.230:443
87.252.106.235:995
12.172.173.82:32101
95.230.110.222:995
88.169.33.180:2222
70.28.50.223:1194
72.80.94.230:443
191.191.1.254:995
209.171.160.69:995
45.62.67.129:443
24.234.80.122:995
81.150.169.174:2222
121.121.100.202:995
92.148.54.239:2222
105.184.83.153:995
70.51.132.7:2222
190.249.245.224:443
208.180.17.32:2222
78.192.109.105:2222
72.205.104.134:443
86.248.228.57:2078
41.129.104.142:443
70.51.247.250:2222
87.220.204.58:2222
24.234.220.88:995
66.35.127.23:2222
201.244.108.183:995
70.28.50.223:2222
98.187.21.2:443
70.28.50.223:2078
142.127.25.253:2222
92.27.86.48:2222
12.172.173.82:2087
86.128.15.251:2222
62.35.230.21:995
150.195.117.207:443
47.16.77.99:2222
198.255.148.59:443
136.35.241.159:443
109.220.83.213:2222
69.159.156.197:2222
103.123.223.131:443
86.160.253.50:443
92.188.241.102:443
172.115.17.50:443
89.181.227.42:2222
41.98.253.136:443
187.199.128.160:32103
2.82.8.80:443
184.82.237.226:443
89.152.20.11:2222
47.21.51.138:443
65.95.192.151:2222
197.83.246.187:443
217.165.255.105:443
12.172.173.82:22
67.71.53.228:2222
79.168.224.165:2222
119.82.91.203:2078
116.75.63.242:443
110.159.115.244:443
45.62.75.217:443
142.154.58.207:443
88.171.156.150:50000
86.178.33.59:2222
73.29.92.128:443
72.134.124.16:443
104.35.24.154:443
71.31.9.226:995
171.96.205.23:443
113.11.92.30:443
89.79.229.50:443
90.63.198.45:995
27.99.32.26:2222
173.178.151.233:443
181.171.231.230:443
151.69.32.238:443
2.49.63.237:2222
178.175.187.254:443
68.186.65.132:443
103.139.243.205:443
113.193.95.38:443
184.176.35.223:2222
24.198.114.130:995
96.87.28.170:2222
41.227.190.59:443
151.3.191.5:443
89.158.150.253:443
86.178.238.140:50000
103.144.201.52:2078
190.133.135.49:995
12.172.173.82:995
93.163.74.91:443
142.79.110.85:443
151.62.193.97:443
147.147.30.126:2222
124.149.132.112:2222
70.49.205.191:2222
162.248.14.107:443
27.0.48.233:443
77.86.98.236:443
67.87.119.216:2078
70.28.50.223:32100
86.222.103.217:2222
12.172.173.82:20
98.4.43.111:443
84.215.202.8:443
102.157.134.72:443
85.95.113.17:995
103.153.180.55:995
201.171.159.196:443
92.20.199.185:2222
85.61.165.153:2222
Signatures
-
Qakbot family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1036-55-0x0000000010000000-0x0000000010024000-memory.dmp
Files
-
1036-55-0x0000000010000000-0x0000000010024000-memory.dmp.dll windows:6 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Sections
.text Size: 98KB - Virtual size: 97KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ