MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 31a90ad6dbe61a0a90ee10802efa1a6ea8cc5edbeb3b74e79f7d07293cd56898. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 31a90ad6dbe61a0a90ee10802efa1a6ea8cc5edbeb3b74e79f7d07293cd56898
SHA3-384 hash: e3775e5eb3825412794b2efc5909b928f400dcfd2c93b5854e7773a904fac9c041fb3f3b60b942297c1cafe64b3666bc
SHA1 hash: 119352f971e74f397d5f78301b144c22be8f944f
MD5 hash: 7df93445d7752cd944b727d3824ebb55
humanhash: jersey-foxtrot-ohio-stream
File name:Qakbot_2.red
Download: download sample
Signature Quakbot
File size:387'072 bytes
First seen:2021-09-27 19:19:42 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash ef258cd2a69e4871222e8a6651dd9af8 (8 x Quakbot)
ssdeep 3072:Do6vBnby4Yx0XjFFzPQ0MslzERfQB24hLxBVi/b/9+PdpiWC35ol/uwfTuT2b2MC:vs6Xpq0H3Jhds/9+qC/zfTPLg
Threatray 168 similar samples on MalwareBazaar
TLSH T130846E27B7CEC812FB771FBFB2838A1455F2AD932123512E15E0B614F976A702992770
Reporter @KodaES
Tags:dll Qakbot Quakbot


Twitter
@KodaES
https://www.virustotal.com/gui/file/31a90ad6dbe61a0a90ee10802efa1a6ea8cc5edbeb3b74e79f7d07293cd56898/detection
https://app.any.run/tasks/80df9488-3869-47b6-9006-76f84110c622#

Intelligence


File Origin
# of uploads :
1
# of downloads :
135
Origin country :
RU RU
Mail intelligence
No data
Vendor Threat Intelligence
Result
Verdict:
Clean
Maliciousness:

Behaviour
Launching the default Windows debugger (dwwin.exe)
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2021-09-27 19:20:08 UTC
AV detection:
18 of 28 (64.29%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:obama104 campaign:1632729661 banker evasion stealer trojan
Behaviour
Creates scheduled task(s)
Modifies data under HKEY_USERS
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Loads dropped DLL
Qakbot/Qbot
Windows security bypass
Malware Config
C2 Extraction:
95.77.223.148:443
47.22.148.6:443
89.101.97.139:443
27.223.92.142:995
120.151.47.189:443
136.232.34.70:443
120.150.218.241:995
185.250.148.74:443
181.118.183.94:443
140.82.49.12:443
67.165.206.193:993
103.148.120.144:443
71.74.12.34:443
76.25.142.196:443
73.151.236.31:443
173.21.10.71:2222
75.188.35.168:443
2.178.88.145:61202
71.80.168.245:443
45.46.53.140:2222
109.12.111.14:443
105.198.236.99:443
73.77.87.137:443
41.248.239.221:995
182.176.112.182:443
96.37.113.36:993
75.66.88.33:443
162.244.227.34:443
24.229.150.54:995
216.201.162.158:443
92.59.35.196:2222
196.218.227.241:995
24.139.72.117:443
68.207.102.78:443
72.252.201.69:443
2.188.27.77:443
177.130.82.197:2222
68.204.7.158:443
189.210.115.207:443
181.163.96.53:443
24.55.112.61:443
75.107.26.196:465
185.250.148.74:2222
68.186.192.69:443
24.152.219.253:995
50.29.166.232:995
Unpacked files
SH256 hash:
805ff047d6310793ea09552ed31bbc0d58e0940122cbcb8925f311114e16c244
MD5 hash:
132232de2d82f95b73fcf22f8421e48c
SHA1 hash:
949b03c6635c641e55869cb752cbca9db6bc115c
SH256 hash:
31a90ad6dbe61a0a90ee10802efa1a6ea8cc5edbeb3b74e79f7d07293cd56898
MD5 hash:
7df93445d7752cd944b727d3824ebb55
SHA1 hash:
119352f971e74f397d5f78301b144c22be8f944f

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments