MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 3ba90f5072f53057e9c4f519cdc92e30d1ee1cf7e534068bca39913ee8db91b7. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 9


Intelligence 9 IOCs YARA File information Comments

SHA256 hash: 3ba90f5072f53057e9c4f519cdc92e30d1ee1cf7e534068bca39913ee8db91b7
SHA3-384 hash: e4238cb610f256547bb7573d273a7dd41882748130c216dc9edf2875ae37bb4eb93a0e91b340a628c2750c03e0df7c2f
SHA1 hash: cda93c305d0f5259ac5c2da004a409be5c448547
MD5 hash: 1a4548a5f954d9d60abbe18bdfd2871f
humanhash: crazy-tennessee-mexico-floor
File name:1a4548a5f954d9d60abbe18bdfd2871f.exe
Download: download sample
Signature Quakbot
File size:2'799'632 bytes
First seen:2020-08-14 06:19:11 UTC
Last seen:2020-08-14 06:50:04 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 8cb0898d9c2292a34a28a0942b11c78f (13 x Quakbot)
ssdeep 12288:BmJnJHUrcxNxIxfxNxnxNxIWxNxsyRxNxRxNx0xNx6gtKO2JO9v:Q5cJkMOR
Threatray 423 similar samples on MalwareBazaar
TLSH A5D5E0A925E11037E6D8CEBD496EBC3A84553A92F42783C3FE80D497EC4139255EF88D
Reporter abuse_ch
Tags:exe Qakbot qbot Quakbot spx154

Intelligence


File Origin
# of uploads :
2
# of downloads :
377
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a window
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect virtual machines (IN, VMware)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2020-08-14 06:21:08 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
n/a
Score:
  1/10
Tags:
n/a
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Quakbot

Executable exe 3ba90f5072f53057e9c4f519cdc92e30d1ee1cf7e534068bca39913ee8db91b7

(this sample)

  
Delivery method
Distributed via web download

Comments