MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0ea6564393fd9d17cd3153e67a46181b10d9a5fdada9203c23f6278c23916386. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 8


Intelligence 8 IOCs YARA File information Comments

SHA256 hash: 0ea6564393fd9d17cd3153e67a46181b10d9a5fdada9203c23f6278c23916386
SHA3-384 hash: b6b1e360726653b412a21858d9fd1e5206af47d5a49758eb66cc813571ab6b8c65d81f5e18d625792d842080ac4cbe3c
SHA1 hash: 734a9f528e3dd292e78a1b335b466e1f7daa34fc
MD5 hash: 540a5d51f667c3fb72fb9aff5f39df27
humanhash: happy-lamp-michigan-cold
File name:540a5d51f667c3fb72fb9aff5f39df27.exe
Download: download sample
Signature Quakbot
File size:786'288 bytes
First seen:2021-02-10 17:02:02 UTC
Last seen:Never
File type:Executable exe
MIME type:application/x-dosexec
imphash 17656638f5a7a054e862b8637b5925d1 (1 x Quakbot)
ssdeep 12288:EMCjB7y1oYxMf9IC0xiBB8is2yU/7uoHHCwXAmDSRZZYpKoOvhTUu4BQD2bjpW82:PCYWYxM1x0QD8iu4unxvSOQJh1I
TLSH F0F49D5D72A7C252D435C0BEC58DAFEAF9BEAD425F0814F32BC07EEC7A325420651299
Reporter abuse_ch
Tags:exe Qakbot qbot Quakbot signed

Code Signing Certificate

Organisation:Symantec Corporation
Issuer:VeriSign Class 3 Code Signing 2004 CA
Algorithm:sha1WithRSAEncryption
Valid from:2007-10-31T00:00:00Z
Valid to:2010-11-24T23:59:59Z
Serial number: 758f5ee8263b6694719d8434eb998608
Intelligence: 4 malware samples on MalwareBazaar are signed with this code signing certificate
Thumbprint Algorithm:SHA256
Thumbprint: f67dda8679c10547d47fbc3bd71d98953d4f73fc60c50035e6f366e3da6395c2
Source:This information was brought to you by ReversingLabs A1000 Malware Analysis Platform

Intelligence


File Origin
# of uploads :
1
# of downloads :
405
Origin country :
n/a
Vendor Threat Intelligence
Malware family:
n/a
ID:
1
File name:
540a5d51f667c3fb72fb9aff5f39df27.exe
Verdict:
No threats detected
Analysis date:
2021-02-10 17:11:48 UTC
Tags:
n/a

Note:
ANY.RUN is an interactive sandbox that analyzes all user actions rather than an uploaded sample
Result
Verdict:
Malware
Maliciousness:

Behaviour
Creating a file in the Windows subdirectories
Launching a process
Modifying an executable file
Creating a process with a hidden window
Creating a window
Sending a UDP request
Unauthorized injection to a system process
Enabling autorun by creating a file
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2021-02-10 17:02:22 UTC
File Type:
PE (Dll)
Extracted files:
140
AV detection:
21 of 29 (72.41%)
Threat level:
  5/5
Verdict:
malicious
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:tr campaign:1612776124 banker stealer trojan
Behaviour
Checks SCSI registry key(s)
Creates scheduled task(s)
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of AdjustPrivilegeToken
Suspicious use of WriteProcessMemory
Program crash
Loads dropped DLL
Qakbot/Qbot
Malware Config
C2 Extraction:
176.205.222.30:2078
174.76.188.217:22
105.226.10.142:443
87.202.87.210:2222
203.194.110.74:443
95.77.223.148:443
45.77.115.208:2222
47.146.169.85:443
76.94.200.148:995
23.240.70.80:443
193.252.48.200:443
154.124.130.140:995
45.32.211.207:2222
149.28.98.196:2222
149.28.98.196:995
149.28.101.90:995
207.246.77.75:2222
45.63.107.192:995
173.70.165.101:995
207.246.116.237:995
149.28.99.97:2222
149.28.101.90:8443
207.246.116.237:443
45.77.115.208:443
45.32.211.207:8443
207.246.77.75:8443
149.28.101.90:443
45.63.107.192:2222
207.246.77.75:995
149.28.99.97:995
45.32.211.207:443
144.202.38.185:443
45.63.107.192:443
149.28.101.90:2222
149.28.99.97:443
45.32.211.207:995
207.246.116.237:2222
207.246.116.237:8443
149.28.98.196:443
144.202.38.185:2222
207.246.77.75:443
144.202.38.185:995
1.52.227.184:443
184.189.122.72:443
201.171.77.138:443
208.126.142.17:443
60.50.255.183:443
172.78.30.215:443
171.103.138.122:995
92.59.35.196:2222
176.181.247.197:443
82.127.125.209:990
45.77.115.208:8443
45.77.115.208:995
50.29.166.232:995
172.87.157.235:3389
85.58.200.50:2222
196.151.252.84:443
24.50.118.93:443
103.51.20.143:2222
86.236.77.68:2222
78.63.226.32:443
82.76.47.211:443
76.25.142.196:443
213.60.147.140:443
151.33.233.193:443
81.88.254.62:443
70.126.76.75:443
160.3.187.114:443
41.205.16.1:443
96.61.23.88:995
86.98.93.124:2078
2.232.253.79:995
209.210.187.52:443
188.25.63.105:443
115.133.243.6:443
27.223.92.142:995
140.82.49.12:443
80.11.173.82:8443
2.7.69.217:2222
190.85.91.154:443
142.68.28.22:443
89.211.252.190:995
178.153.37.196:443
79.129.121.81:995
71.88.193.17:443
86.160.137.132:443
202.184.20.119:443
83.110.12.140:2222
115.69.252.0:22
105.198.236.101:443
144.139.47.206:443
105.198.236.99:443
197.45.110.165:995
85.132.36.111:2222
70.168.130.172:995
71.187.170.235:443
80.227.5.69:443
59.90.246.200:443
81.214.126.173:2222
68.225.60.77:995
108.31.15.10:995
83.110.108.181:2222
46.153.119.255:995
216.201.162.158:443
197.161.154.132:443
96.21.251.127:2222
75.136.40.155:443
24.95.61.62:443
68.186.192.69:443
193.248.221.184:2222
75.67.192.125:443
81.97.154.100:443
75.118.1.141:443
47.22.148.6:443
182.48.193.200:443
203.198.96.37:443
106.51.52.111:443
83.110.103.152:443
75.136.26.147:443
2.50.2.216:443
189.223.234.23:995
74.222.204.82:995
173.21.10.71:2222
69.123.179.70:443
71.74.12.34:443
45.46.53.140:2222
86.97.162.85:443
2.51.171.223:443
144.139.166.18:443
71.197.126.250:443
67.6.12.4:443
122.148.156.131:995
64.121.114.87:443
50.244.112.106:443
70.54.25.76:2222
1.32.35.2:443
89.137.211.239:995
67.165.206.193:993
186.28.51.27:443
98.240.24.57:443
109.12.111.14:443
71.14.110.199:443
94.53.92.42:443
84.247.55.190:8443
24.27.82.216:2222
74.68.144.202:443
196.221.207.137:995
85.184.63.112:443
67.8.103.21:443
Unpacked files
SH256 hash:
0ea6564393fd9d17cd3153e67a46181b10d9a5fdada9203c23f6278c23916386
MD5 hash:
540a5d51f667c3fb72fb9aff5f39df27
SHA1 hash:
734a9f528e3dd292e78a1b335b466e1f7daa34fc
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Quakbot

Executable exe 0ea6564393fd9d17cd3153e67a46181b10d9a5fdada9203c23f6278c23916386

(this sample)

  
Delivery method
Distributed via web download

Comments