Malicious
Classifications
Trojan Banker Injector
Threat Names
QBot
Dynamic Analysis Report
Created on 2023-06-22T22:39:30+00:00
286512f7ef23bd2b9e331775433fa3a00832bb9e701ad4ec1e7fe8bd00026e72.js
JScript
Remarks (1/1)
(0x0200000E): The overall sleep time of all monitored processes was truncated from "52 minutes, 37 seconds" to "3 minutes, 30 seconds" to reveal dormant functionality.
This is a filtered view
This list contains only the embedded files, downloaded files, and dropped files
Filters: |
There are no files for this filter
There are no files in this analysis
File Name | Category | Type | Verdict | Actions |
---|
C:\Users\kEecfMwgj\Desktop\286512f7ef23bd2b9e331775433fa3a00832bb9e701ad4ec1e7fe8bd00026e72.js | Sample File | JavaScript |
Malicious
|
...
|
»
b613a90ac58d95c7b0b20c8df883fd6a72e8c148efbab7b19abc461426aa0071 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
032309a9b307c427dbfea28f3612e777f048be6b46160d0a3c1438c8a096f1ad | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
4b732f20a120b1e323373c67f34c1b1bc6f9a411405ddb46af39264d0c6a8949 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
cd890a9c6c0bacf3e2f33f206fc49713d9f0c8982ca254e16362dbb49316e290 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
45507a96fbf43c3f0fb60be634e8f79523d59dd0c27accbf6896bb09744e4473 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
63a7fd6620975a43fe615201d6d018923d4ad569e40b00dc004b73da971012a6 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
80474bd0da0298f95574efb5c210c215b3e63b09ae4bdf2954d9359302e6c1db | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
f141ed4718577508cf2fbbd1e711fe1f897faa8104063fee246118d128e9dd2f | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
ab52091cf0a04147b1345060ffce20ceae7d2025b143e612e53497eb6c76f223 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
fbcdad46748ac9f52b0b2eaddf5a53c048ce0fae9073c4b6c6ba46be63a35306 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
2beaed0553baeaf07cae189d3dd46a0c75db748939465fcbbfc433ac01d6fda6 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
13d40af569f829be3e0619249e1d4e85cd031981bdf7da2f203eedf553e73722 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
ffc37458553cfb6651c2e90300c7c4eecb15547e008fa6dd8bdddc71cebab1aa | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
115ec5439a0e2547fda33ccf4b955e77b91ed68d2d8d6549062ee3b11e9f4f61 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
be21ce0861c1d3535c08c23066a68e87b5c6b054609d011a253e1e1372305314 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
869125e84b5f17c2ab170795f935dfce4e8e07480a65e30db74f8f72c90032d4 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
f1ccbd1b49e91b66131db6864232957529c8ff4be36faeaebafab094b9b7f1ac | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
2b642df909ad9cdab21023cbec39b90e51637fd4b101cdeff2ec4ed8b4798563 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
bb652875caa06cb3e161d40678628c781c9977c94c08ac815ad6eece2851e5af | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
88520e6aa6c51aba8adf68664b89684afaf565cc77f03848ba04565564badf46 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
b50e3b1996333e3f4ba1e5d253c95e0697501f3a0d79a0fd5b5786499587c8bc | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
bb7d8ac37f91af16e0696d9dd83c02ccae35ac281a7215ca2a8f9fac059b4b47 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
780647d96686cd7787cd87f2e84929d0631600f1819c3057607fb31317fad1ad | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.44 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.56 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
301e1eab21e947a5af6f9f0feafe7b1d6f7c1e6b8ac0104d7434f40643787c6c | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
9d0bff67d85c5d48863a67eef86fbc4b91779b1f89d41776d45b787aa01fe195 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
f7780b52362249d676a59d3a72ac6ce40f1560c0356a6d064f0f16731dccce55 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
cd3684aea8ac062deb1d8a4c1fa2fb2382da2290528999a49f04a71527860db0 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
ff03c02b94a8594083047efd8522ddc432526f7fe19db7b303d6d26ceb1ec108 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
7dfdf79c8f4a195193969012527fa39e626e573eb506f6ae2fd3fdf363b57f47 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
e151f03cd8bccbe66755855aea52efcf953f8621a156996862c873e7c23892c8 | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
4fde8f91e68a5c829c1f27159e9244d7d61d84b514dd57cd42ee60ecfc49042b | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
d20aebe1efc64390b3df911f6d98c209ebbf042441ba1838b705cbb45139529f | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
7ccaa78f1301462ddd01310b6eab123583f3b5eb05590edf25f8539974b07efb | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
4c4537622c8517313e196ac419fa1408306ee9803a9af75eb4ee4966fdb7b7db | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.42 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.55 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 5.21 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.84 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 7.89 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
89c23c74007fa94ce211d4c7df481788214f0a8732237fd58e120b9f528a883b | Memory Dump | Binary |
Malicious
|
...
|
»
PE Information
»
Image Base | 0x10000000 |
Entry Point | 0x10001015 |
Size Of Code | 0x00018800 |
Size Of Initialized Data | 0x00007C00 |
File Type | IMAGE_FILE_DLL |
Subsystem | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Machine Type | IMAGE_FILE_MACHINE_I386 |
Compile Timestamp | 2023-06-22 14:38 (UTC+2) |
Sections (5)
»
Name | Virtual Address | Virtual Size | Raw Data Size | Raw Data Offset | Flags | Entropy |
---|---|---|---|---|---|---|
.text | 0x10001000 | 0x00018628 | 0x00018800 | 0x00000400 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.55 |
.rdata | 0x1001A000 | 0x000047FA | 0x00004800 | 0x00018C00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 6.97 |
.data | 0x1001F000 | 0x0000213C | 0x00002000 | 0x0001D400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 7.89 |
.rsrc | 0x10022000 | 0x00000510 | 0x00000600 | 0x0001F400 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.29 |
.reloc | 0x10023000 | 0x00000CD4 | 0x00000E00 | 0x0001FA00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.43 |
Imports (6)
»
msvcrt.dll (18)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
_snprintf | - | 0x1001A0F4 | 0x0001E2C4 | 0x0001CEC4 | 0x000002F5 |
memchr | - | 0x1001A0F8 | 0x0001E2C8 | 0x0001CEC8 | 0x000004AE |
malloc | - | 0x1001A0FC | 0x0001E2CC | 0x0001CECC | 0x000004A4 |
_errno | - | 0x1001A100 | 0x0001E2D0 | 0x0001CED0 | 0x0000011C |
_strtoi64 | - | 0x1001A104 | 0x0001E2D4 | 0x0001CED4 | 0x0000033A |
_vsnprintf | - | 0x1001A108 | 0x0001E2D8 | 0x0001CED8 | 0x0000038E |
memset | - | 0x1001A10C | 0x0001E2DC | 0x0001CEDC | 0x000004B4 |
qsort | - | 0x1001A110 | 0x0001E2E0 | 0x0001CEE0 | 0x000004C0 |
_ftol2_sse | - | 0x1001A114 | 0x0001E2E4 | 0x0001CEE4 | 0x0000015B |
_vsnwprintf | - | 0x1001A118 | 0x0001E2E8 | 0x0001CEE8 | 0x00000394 |
free | - | 0x1001A11C | 0x0001E2EC | 0x0001CEEC | 0x0000046C |
_time64 | - | 0x1001A120 | 0x0001E2F0 | 0x0001CEF0 | 0x00000354 |
strncpy | - | 0x1001A124 | 0x0001E2F4 | 0x0001CEF4 | 0x000004E6 |
strchr | - | 0x1001A128 | 0x0001E2F8 | 0x0001CEF8 | 0x000004D9 |
strtod | - | 0x1001A12C | 0x0001E2FC | 0x0001CEFC | 0x000004ED |
localeconv | - | 0x1001A130 | 0x0001E300 | 0x0001CF00 | 0x0000049F |
memcpy | - | 0x1001A134 | 0x0001E304 | 0x0001CF04 | 0x000004B0 |
atol | - | 0x1001A138 | 0x0001E308 | 0x0001CF08 | 0x00000447 |
KERNEL32.dll (47)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
GetTickCount | - | 0x1001A000 | 0x0001E1D0 | 0x0001CDD0 | 0x0000030A |
SetThreadPriority | - | 0x1001A004 | 0x0001E1D4 | 0x0001CDD4 | 0x00000562 |
FlushFileBuffers | - | 0x1001A008 | 0x0001E1D8 | 0x0001CDD8 | 0x000001A2 |
LocalAlloc | - | 0x1001A00C | 0x0001E1DC | 0x0001CDDC | 0x000003CE |
GetExitCodeProcess | - | 0x1001A010 | 0x0001E1E0 | 0x0001CDE0 | 0x0000023F |
GetSystemTimeAsFileTime | - | 0x1001A014 | 0x0001E1E4 | 0x0001CDE4 | 0x000002EC |
GetFileAttributesW | - | 0x1001A018 | 0x0001E1E8 | 0x0001CDE8 | 0x00000248 |
MultiByteToWideChar | - | 0x1001A01C | 0x0001E1EC | 0x0001CDEC | 0x000003F3 |
SetCurrentDirectoryA | - | 0x1001A020 | 0x0001E1F0 | 0x0001CDF0 | 0x0000050A |
Sleep | - | 0x1001A024 | 0x0001E1F4 | 0x0001CDF4 | 0x00000581 |
lstrcmpiW | - | 0x1001A028 | 0x0001E1F8 | 0x0001CDF8 | 0x00000637 |
GetDriveTypeW | - | 0x1001A02C | 0x0001E1FC | 0x0001CDFC | 0x00000232 |
GetLastError | - | 0x1001A030 | 0x0001E200 | 0x0001CE00 | 0x00000264 |
CreateDirectoryW | - | 0x1001A034 | 0x0001E204 | 0x0001CE04 | 0x000000BD |
lstrcatA | - | 0x1001A038 | 0x0001E208 | 0x0001CE08 | 0x00000630 |
CreateMutexW | - | 0x1001A03C | 0x0001E20C | 0x0001CE0C | 0x000000DD |
GetCurrentThread | - | 0x1001A040 | 0x0001E210 | 0x0001CE10 | 0x0000021E |
GetProcessId | - | 0x1001A044 | 0x0001E214 | 0x0001CE14 | 0x000002B9 |
DisconnectNamedPipe | - | 0x1001A048 | 0x0001E218 | 0x0001CE18 | 0x00000125 |
lstrcmpA | - | 0x1001A04C | 0x0001E21C | 0x0001CE1C | 0x00000633 |
K32GetModuleFileNameExW | - | 0x1001A050 | 0x0001E220 | 0x0001CE20 | 0x000003A7 |
MoveFileW | - | 0x1001A054 | 0x0001E224 | 0x0001CE24 | 0x000003EF |
ExitThread | - | 0x1001A058 | 0x0001E228 | 0x0001CE28 | 0x00000162 |
GetNumberFormatA | - | 0x1001A05C | 0x0001E22C | 0x0001CE2C | 0x00000294 |
GetCurrentProcessId | - | 0x1001A060 | 0x0001E230 | 0x0001CE30 | 0x0000021B |
SwitchToThread | - | 0x1001A064 | 0x0001E234 | 0x0001CE34 | 0x0000058B |
GetModuleHandleW | - | 0x1001A068 | 0x0001E238 | 0x0001CE38 | 0x0000027B |
GetProcAddress | - | 0x1001A06C | 0x0001E23C | 0x0001CE3C | 0x000002B1 |
HeapCreate | - | 0x1001A070 | 0x0001E240 | 0x0001CE40 | 0x0000034A |
HeapFree | - | 0x1001A074 | 0x0001E244 | 0x0001CE44 | 0x0000034C |
HeapAlloc | - | 0x1001A078 | 0x0001E248 | 0x0001CE48 | 0x00000348 |
lstrlenW | - | 0x1001A07C | 0x0001E24C | 0x0001CE4C | 0x00000640 |
LoadLibraryW | - | 0x1001A080 | 0x0001E250 | 0x0001CE50 | 0x000003C8 |
FreeLibrary | - | 0x1001A084 | 0x0001E254 | 0x0001CE54 | 0x000001AE |
GetModuleHandleA | - | 0x1001A088 | 0x0001E258 | 0x0001CE58 | 0x00000278 |
LoadLibraryA | - | 0x1001A08C | 0x0001E25C | 0x0001CE5C | 0x000003C5 |
GetCurrentProcess | - | 0x1001A090 | 0x0001E260 | 0x0001CE60 | 0x0000021A |
lstrcatW | - | 0x1001A094 | 0x0001E264 | 0x0001CE64 | 0x00000631 |
GetWindowsDirectoryW | - | 0x1001A098 | 0x0001E268 | 0x0001CE68 | 0x00000329 |
WideCharToMultiByte | - | 0x1001A09C | 0x0001E26C | 0x0001CE6C | 0x00000602 |
FindFirstFileW | - | 0x1001A0A0 | 0x0001E270 | 0x0001CE70 | 0x00000183 |
FindNextFileW | - | 0x1001A0A4 | 0x0001E274 | 0x0001CE74 | 0x0000018F |
SetFileAttributesW | - | 0x1001A0A8 | 0x0001E278 | 0x0001CE78 | 0x0000051F |
GetCommandLineW | - | 0x1001A0AC | 0x0001E27C | 0x0001CE7C | 0x000001DA |
GetVersionExA | - | 0x1001A0B0 | 0x0001E280 | 0x0001CE80 | 0x0000031D |
GetSystemInfo | - | 0x1001A0B4 | 0x0001E284 | 0x0001CE84 | 0x000002E6 |
GetCurrentDirectoryW | - | 0x1001A0B8 | 0x0001E288 | 0x0001CE88 | 0x00000214 |
USER32.dll (2)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CharUpperBuffA | - | 0x1001A0E8 | 0x0001E2B8 | 0x0001CEB8 | 0x0000003D |
CharUpperBuffW | - | 0x1001A0EC | 0x0001E2BC | 0x0001CEBC | 0x0000003E |
SHELL32.dll (1)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CommandLineToArgvW | - | 0x1001A0E0 | 0x0001E2B0 | 0x0001CEB0 | 0x00000008 |
ole32.dll (4)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
CoCreateInstance | - | 0x1001A140 | 0x0001E310 | 0x0001CF10 | 0x00000028 |
CoInitializeEx | - | 0x1001A144 | 0x0001E314 | 0x0001CF14 | 0x0000005E |
CoSetProxyBlanket | - | 0x1001A148 | 0x0001E318 | 0x0001CF18 | 0x00000084 |
CoInitializeSecurity | - | 0x1001A14C | 0x0001E31C | 0x0001CF1C | 0x0000005F |
OLEAUT32.dll (7)
»
API Name | Ordinal | IAT Address | Thunk RVA | Thunk Offset | Hint |
---|---|---|---|---|---|
SafeArrayGetLBound | 0x00000014 | 0x1001A0C0 | 0x0001E290 | 0x0001CE90 | - |
SysFreeString | 0x00000006 | 0x1001A0C4 | 0x0001E294 | 0x0001CE94 | - |
SysAllocString | 0x00000002 | 0x1001A0C8 | 0x0001E298 | 0x0001CE98 | - |
VariantClear | 0x00000009 | 0x1001A0CC | 0x0001E29C | 0x0001CE9C | - |
SafeArrayGetUBound | 0x00000013 | 0x1001A0D0 | 0x0001E2A0 | 0x0001CEA0 | - |
SafeArrayDestroy | 0x00000010 | 0x1001A0D4 | 0x0001E2A4 | 0x0001CEA4 | - |
SafeArrayGetElement | 0x00000019 | 0x1001A0D8 | 0x0001E2A8 | 0x0001CEA8 | - |
Exports (1)
»
API Name | EAT Address | Ordinal |
---|---|---|
zertc | 0x00001000 | 0x00000001 |
YARA Matches (1)
»
Rule Name | Rule Description | Classification | Score | Actions |
---|---|---|---|---|
QBotCoreModule | QBot Trojan Core DLL | Banker, Trojan |
5/5
|
...
|
c:\users\keecfmwgj\appdata\roaming\microsoft\windows\cookies\keecfmwgj@oracle[2].txt | Dropped File | Text |
Clean
|
...
|
»
c:\users\keecfmwgj\appdata\roaming\microsoft\windows\cookies\keecfmwgj@oracle[1].txt | Dropped File | Text |
Clean
|
...
|
»
c:\samr | Dropped File | Empty |
Clean
|
...
|
»
c:\users\keecfmwgj\appdata\local\microsoft\windows\temporary internet files\content.ie5\x9ohk109\t5[1] | Downloaded File | Text |
Clean
|
...
|
»
bd50618de9ee069529d9882f1eb51c9defd0febb38aae14c17e1977b65720158 | Downloaded File | HTML |
Clean
|
...
|
»
519059995e97ae49a86da834c1c2d2e48fa94730de36080eace7cc369858270b | Downloaded File | Text |
Clean
|
...
|
»