MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0029e9cc616276a2d6605f723d515c326287c063d97c746aee588050a56a531b. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 5


Intelligence 5 IOCs YARA 1 File information Comments

SHA256 hash: 0029e9cc616276a2d6605f723d515c326287c063d97c746aee588050a56a531b
SHA3-384 hash: a3284decbdd0446bd1ef7b84496a9c44678eb04e5a04c1f552adf899d8cfb74f563be6995f11b196b2b84ea03c677a5a
SHA1 hash: 711cddda641cdb29c4a0900cc608b35a3a1610dc
MD5 hash: b6a14a209a245b0fc6276b4c9fedac3f
humanhash: tennessee-network-yellow-triple
File name:LastTerms_AXJ5.zip
Download: download sample
Signature Quakbot
File size:381'652 bytes
First seen:2022-12-28 17:35:53 UTC
Last seen:Never
File type: zip
MIME type:application/zip
Note:This file is a password protected archive. The password is: 514126
ssdeep 6144:6K35RWPThigGQtzr01My4wGPpIICve3+nsRe3PehWnEGlpyFCKyyfeaI0k3uEwa:NElNGQtPkMy82ICveunBPqWnESpyhyUi
TLSH T198842355214F0D48F4C6A83E05C55C215920EEEB17F42BC439BA2ECB96877FF77A06A4
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter pr0xylife
Tags:1672147664 azd pw-514126 Qakbot Quakbot zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
148
Origin country :
CL CL
File Archive Information

This file archive contains 5 file(s), sorted by their relevance:

File name:InvoiceUpdate.txt
File size:257'697 bytes
SHA256 hash: 84a7334dc94d0837fa5391a8aff01f0b6a1ad13436a3926b97aeb8bcb52277fd
MD5 hash: b754df3269e1ade8bab3817c6c5d8c3e
MIME type:text/plain
Signature Quakbot
File name:LastInvoiceUpdate.txt
File size:150'540 bytes
SHA256 hash: 231d0d335e5c750d0aed95202d192912f2be8ee1d97d947a890d08db26e4cddc
MD5 hash: 00fa3d3bf7cada583f2e27f1b1a54a51
MIME type:text/plain
Signature Quakbot
File name:DirectContract.new
File size:565'760 bytes
SHA256 hash: 1bcb3eef5c6f8554249cfb5fddc68024335825a8568816ffc8c9a6e89f27c5d0
MD5 hash: 76b2ae39b536b6c50726bb1a4e409842
MIME type:application/x-dosexec
Signature Quakbot
File name:RulesChanges_SVX8.lnk
File size:2'010 bytes
SHA256 hash: 3535acd1a176c0fe04e74db72efe2545711aadb165ca1c4dc92535a8a7fcf112
MD5 hash: 6d5f24242653c3a77b9b99f910fb04e3
MIME type:application/octet-stream
Signature Quakbot
File name:RecentInformation.cmd
File size:12'408 bytes
SHA256 hash: 629015adf2686d5aec3c31ff275442250a290ccfd5e31ba8ad1f30e4185edd00
MD5 hash: c0a05755601d17f517bff24f71a097a0
MIME type:text/x-msdos-batch
Signature Quakbot
Vendor Threat Intelligence
Gathering data
Threat name:
Binary.Trojan.Generic
Status:
Suspicious
First seen:
2022-12-28 10:29:07 UTC
File Type:
Binary (Archive)
AV detection:
3 of 40 (7.50%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:azd campaign:1672147664 banker stealer trojan
Behaviour
Suspicious use of WriteProcessMemory
Program crash
Malware Config
C2 Extraction:
80.103.77.44:2222
136.35.241.159:443
73.88.173.113:443
186.64.67.12:443
76.80.180.154:995
83.248.199.56:443
125.20.112.94:443
72.80.7.6:995
50.68.204.71:443
90.79.129.166:2222
108.162.6.34:443
86.130.9.250:2222
41.228.225.131:995
86.134.75.5:443
190.249.241.149:443
70.115.104.126:995
84.113.121.103:443
198.2.51.242:993
172.90.139.138:2222
89.115.196.99:443
206.166.209.170:2222
162.248.14.107:443
201.210.79.16:2222
86.160.253.56:443
86.160.217.36:50000
95.23.15.84:2222
181.118.206.65:995
73.174.23.116:443
209.171.163.72:995
50.68.204.71:995
201.244.108.183:995
199.83.165.233:443
121.121.100.88:995
202.142.98.62:443
172.248.42.122:443
92.8.187.85:2222
98.187.21.2:443
85.85.34.201:993
69.133.162.35:443
70.95.236.129:443
76.20.42.45:443
12.172.173.82:32101
77.86.98.236:443
174.104.184.149:443
74.92.243.113:50000
12.172.173.82:993
12.172.173.82:990
90.119.197.132:2222
87.221.196.217:2222
76.100.159.250:443
184.68.116.146:61202
213.31.90.183:2222
86.183.251.169:2222
85.241.180.94:443
98.145.23.67:443
73.161.176.218:443
78.101.91.215:2222
71.31.101.183:443
74.33.196.114:443
183.87.163.165:443
93.156.96.104:443
50.68.204.71:993
12.172.173.82:22
173.76.49.61:443
173.18.126.3:443
75.98.154.19:443
86.225.214.138:2222
74.66.134.24:443
184.176.154.83:995
12.172.173.82:20
91.169.12.198:32100
81.229.117.95:2222
92.186.69.229:2222
77.124.17.122:443
103.42.86.42:995
46.10.198.106:443
92.239.81.124:443
202.142.98.62:995
82.6.99.234:443
24.142.218.202:443
91.68.227.219:443
90.116.219.167:2222
92.189.214.236:2222
188.48.85.14:995
175.139.207.179:2222
75.115.14.189:443
27.0.48.233:443
103.252.7.228:443
12.172.173.82:50001
37.15.128.31:2222
103.141.50.151:995
108.6.249.139:443
75.143.236.149:443
185.13.180.250:443
46.24.136.17:2078
64.237.240.3:443
184.68.116.146:3389
31.167.254.199:995
66.191.69.18:995
184.68.116.146:2222
82.36.36.76:443
73.36.196.11:443
73.29.92.128:443
27.0.62.241:995
67.235.138.14:443
117.193.3.78:443
184.153.132.82:443
47.34.30.133:443
12.172.173.82:995
178.142.122.128:443
109.159.119.203:2222
81.248.77.37:2222
93.147.134.85:443
124.171.159.71:443
75.99.125.238:2222
178.153.3.212:443
103.144.201.62:2078
84.35.26.14:995
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:pdb_YARAify
Author:@wowabiy314
Description:PDB

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Quakbot

zip 0029e9cc616276a2d6605f723d515c326287c063d97c746aee588050a56a531b

(this sample)

  
Delivery method
Distributed via web download

Comments