MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 07800361c385ebe050c51f65392e9fe7aab7e12163241e5ba5ac80e7e82ca438. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



QuakBot


Vendor detections: 7


Intelligence 7 IOCs YARA File information Comments

SHA256 hash: 07800361c385ebe050c51f65392e9fe7aab7e12163241e5ba5ac80e7e82ca438
SHA3-384 hash: 7d344dc64fd10f26a7f26858dbdd549ef89bd9b84d7937addabb61fbcf8d87f48ac57005e49b472b89381abaef4f166b
SHA1 hash: 84feeb5d78624f3e2faf8df043b16c7e5311e097
MD5 hash: e73f6e5c0c920e93818a6a93e57e97ea
humanhash: oscar-magnesium-three-early
File name:07800361c385ebe050c51f65392e9fe7aab7e12163241e5ba5ac80e7e82ca438
Download: download sample
Signature QuakBot
File size:261'080 bytes
First seen:2020-11-13 16:11:05 UTC
Last seen:2024-07-24 10:56:30 UTC
File type:Executable exe
MIME type:application/x-dosexec
ssdeep 3072:JCawmISRvDkMFC2Z0Jy4hoahQ/ii0ueKCfu+XuFKgMLqllq7PCufDfq433wb3jJO:EawCRk4Z0NhbJtWYKjSTfivM
TLSH E744E05263E80445F86B96B78C72832016227CA5E73E5B9D0EC5B36D4E35F726FC072A
Reporter seifreed
Tags:Quakbot

Intelligence


File Origin
# of uploads :
2
# of downloads :
65
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a process with a hidden window
Creating a file in the Windows subdirectories
Creating a file in the %AppData% subdirectories
Creating a process from a recently created file
Launching a process
Creating a window
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Infostealer.QBot
Status:
Malicious
First seen:
2020-11-13 16:28:23 UTC
AV detection:
26 of 29 (89.66%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot banker stealer trojan
Behaviour
Runs ping.exe
Suspicious behavior: EnumeratesProcesses
Suspicious use of WriteProcessMemory
Checks SCSI registry key(s)
Qakbot/Qbot
Unpacked files
SH256 hash:
07800361c385ebe050c51f65392e9fe7aab7e12163241e5ba5ac80e7e82ca438
MD5 hash:
e73f6e5c0c920e93818a6a93e57e97ea
SHA1 hash:
84feeb5d78624f3e2faf8df043b16c7e5311e097
SH256 hash:
36bf0f1cc77eabe945f95dacbccb05957b2b93d3bdecf238bc8e0917f5c70c5f
MD5 hash:
7dd8c004c315b431673912f81b225887
SHA1 hash:
d16322ac782e97358be673a2f69ae55edc55980a
Detections:
win_qakbot_g0 win_qakbot_auto
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

  
Delivery method
Other

Comments