MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 e5d3a7159b8e4fe10969342e05e09c645898145f760eeb250430cc4e20455131. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 10


Intelligence 10 IOCs YARA File information Comments

SHA256 hash: e5d3a7159b8e4fe10969342e05e09c645898145f760eeb250430cc4e20455131
SHA3-384 hash: b2d32862ab67ecf3a1f32a50818f0d4740052ff86fa6c49412f6dde3335867ab9e46c9c6e6a03da3277dec1eff3f769e
SHA1 hash: 223b8e54ac283d5589418224f462e1e1ae776f76
MD5 hash: 2e2a0f510b9d187390be08f134bc5118
humanhash: enemy-island-eleven-princess
File name:1597241585.png
Download: download sample
Signature Quakbot
File size:2'801'168 bytes
First seen:2020-08-12 15:01:46 UTC
Last seen:2020-08-12 15:56:15 UTC
File type:Executable exe
MIME type:application/x-dosexec
imphash 8dcd2704b33bb40b833725f37f2dcdaf (4 x Quakbot)
ssdeep 12288:HmJnJHUrcxNxoxfxNxnxNxIWxNxsyRxNxRxNx0xNxZ0j8lWbocikE:G5cpk0gl8u
Threatray 420 similar samples on MalwareBazaar
TLSH F2D5E0F4A5E8C17BE6D8CE3D566F7C7AC0093E52EA1383D7FD84C0C6994129614EA6C8
Reporter threathive
Tags:Qakbot Quakbot spx153


Avatar
ThreatHive
Pulled from:

File Name: 1597241585.png
MD5: 2e2a0f510b9d187390be08f134bc5118
SHA1: 223b8e54ac283d5589418224f462e1e1ae776f76
SHA256: e5d3a7159b8e4fe10969342e05e09c645898145f760eeb250430cc4e20455131

hxxp://hangtieudunggiare.com/hkqukrtb/1597241585.png
hxxp://gvcvn.com/xihwoiusu/1597241585.png
hxxp://planetmartech.com/szvqbzie/1597241585.png
hxxp://www.bluekarmadigital.com/xzvjrex/1597241585.png
hxxp://opticaslooking.com/twmgu/1597241585.png
hxxp://sanderleisilveira.online/nhnuxijx/1597241585.png

Intelligence


File Origin
# of uploads :
2
# of downloads :
391
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Sending a UDP request
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Threat name:
Unknown
Detection:
malicious
Classification:
evad
Score:
68 / 100
Signature
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to detect virtual machines (IN, VMware)
Detected unpacking (changes PE section rights)
Detected unpacking (overwrites its own PE header)
Machine Learning detection for sample
Behaviour
Behavior Graph:
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2020-08-12 15:03:06 UTC
AV detection:
27 of 29 (93.10%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
trojan banker stealer family:qakbot
Behaviour
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Loads dropped DLL
Executes dropped EXE
Qakbot/Qbot
Malware Config
C2 Extraction:
72.28.255.159:995
49.191.3.234:443
70.123.92.175:2222
186.31.47.22:443
178.222.12.162:995
79.118.180.35:443
72.240.200.181:2222
71.182.142.63:443
172.87.134.226:443
99.231.221.117:443
24.204.155.208:443
5.13.88.29:995
76.187.12.181:443
70.126.76.75:443
92.59.35.196:2222
207.255.158.180:443
189.140.55.226:443
199.116.241.147:443
187.214.9.138:995
213.120.109.73:2222
185.246.9.69:995
197.210.96.222:995
75.137.47.174:443
217.162.149.212:443
72.51.126.215:20
71.192.44.92:443
71.126.139.251:443
217.165.115.0:995
188.15.173.34:995
98.4.227.199:443
72.142.106.198:995
65.131.38.205:995
67.246.16.250:995
189.163.82.104:443
174.80.7.235:443
149.71.49.39:443
172.78.1.133:443
2.187.83.99:995
188.27.17.23:443
83.110.226.145:443
68.39.160.40:443
65.96.36.157:443
84.117.176.32:443
86.182.234.245:2222
71.43.175.202:61200
67.209.195.198:443
73.227.232.166:443
108.46.145.30:443
72.209.191.27:443
95.77.144.238:443
67.8.103.21:443
76.170.77.99:995
47.153.115.154:465
200.75.136.78:443
67.6.3.51:443
75.136.40.155:443
151.244.191.164:443
5.12.133.222:443
100.37.36.240:443
24.229.150.54:995
77.27.173.8:995
207.255.161.8:465
75.137.239.211:443
24.28.183.107:995
39.36.255.146:995
178.193.38.188:2222
148.75.231.53:443
68.190.152.98:443
67.165.206.193:993
75.183.171.155:995
2.50.58.159:443
79.118.238.69:443
74.222.204.82:443
74.195.88.59:995
208.93.202.49:443
98.190.24.81:443
2.89.74.34:20
209.137.209.163:995
95.76.185.240:443
73.60.148.209:443
47.206.174.82:443
93.151.180.170:61202
98.173.34.212:995
151.205.102.42:443
84.232.238.30:443
186.82.157.66:443
45.77.215.141:443
144.202.48.107:443
86.98.89.9:2222
94.59.241.189:995
95.77.223.148:443
78.100.192.173:443
156.213.12.78:443
75.130.117.134:443
96.227.127.13:443
187.163.101.137:995
72.142.106.198:465
37.106.112.141:443
72.190.101.70:443
207.255.18.67:443
2.89.74.34:995
89.247.217.144:443
41.230.210.144:443
98.219.77.197:443
186.6.197.11:443
5.15.54.233:443
75.110.250.89:995
74.75.237.11:443
47.28.131.209:443
176.205.255.97:443
66.30.92.147:443
24.210.45.215:443
188.173.185.139:443
188.51.3.210:995
24.234.86.201:995
96.232.163.27:443
217.165.164.57:2222
83.110.92.29:443
78.102.138.103:995
207.246.75.201:443
199.247.22.145:443
199.247.16.80:443
80.240.26.178:443
47.44.217.98:443
76.179.54.116:443
207.246.71.122:443
200.124.231.21:443
172.78.30.215:443
47.146.32.175:443
12.5.37.3:995
151.73.112.220:443
134.0.196.46:995
188.247.252.243:443
24.139.132.70:443
156.222.12.150:995
193.248.44.2:2222
66.222.88.126:995
24.116.227.63:443
2.89.74.34:21
207.255.161.8:993
47.153.115.154:995
24.231.54.185:2222
100.4.173.223:443
2.51.240.61:995
63.155.9.141:995
93.113.177.152:443
117.218.208.239:443
68.225.56.31:443
66.57.216.53:993
108.185.113.12:443
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Quakbot

Executable exe e5d3a7159b8e4fe10969342e05e09c645898145f760eeb250430cc4e20455131

(this sample)

  
Delivery method
Distributed via web download

Comments