MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 0ec25b0db6bd1466458d898121de430e110ff3bcb870afac634240de027ab43a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 11


Intelligence 11 IOCs YARA File information Comments

SHA256 hash: 0ec25b0db6bd1466458d898121de430e110ff3bcb870afac634240de027ab43a
SHA3-384 hash: ae1a503e1c96ebbf56fca98d40531ceb90a9c439da63ad1910854f9d9c239188fc5d856f4d70ea119dbea37a3740b51c
SHA1 hash: e697100ecf834a599c95ec71d33c1f5e52b18b02
MD5 hash: 29e572000dd232365c4ce9566d220c9a
humanhash: twenty-king-nevada-floor
File name:competitive.dat
Download: download sample
Signature Quakbot
File size:745'472 bytes
First seen:2022-10-25 11:28:29 UTC
Last seen:Never
File type:DLL dll
MIME type:application/x-dosexec
imphash d833407db486106e47f28b98cbd678b4 (2 x Quakbot)
ssdeep 12288:9Zvx07iKfDISZYRobaZ0UrIBfUQ0eIFM4W+QnwldJOCP6HlD5:9ta1DjZBBAgdIM4K6dMCSHl
Threatray 1'573 similar samples on MalwareBazaar
TLSH T194F4AF32F1E8C433D1362AB89D3752A59C6BBD016D28AC4A6FE50F4D4F39A4136252F7
TrID 47.6% (.EXE) Win32 Executable Delphi generic (14182/79/4)
15.1% (.EXE) Win32 Executable (generic) (4505/5/1)
10.0% (.MZP) WinArchiver Mountable compressed Archive (3000/1)
6.9% (.EXE) Win16/32 Executable Delphi generic (2072/23)
6.8% (.EXE) OS/2 Executable (generic) (2029/13)
File icon (PE):PE icon
dhash icon 399998ecd4d46c0e (572 x Quakbot, 137 x ArkeiStealer, 82 x GCleaner)
Reporter proxylife
Tags:1666691039 BB04 dll Qakbot Quakbot

Intelligence


File Origin
# of uploads :
1
# of downloads :
229
Origin country :
n/a
Vendor Threat Intelligence
Result
Verdict:
Suspicious
Maliciousness:

Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Launching a process
Modifying an executable file
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2022-10-25 12:10:16 UTC
File Type:
PE (Dll)
Extracted files:
38
AV detection:
20 of 26 (76.92%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:bb04 campaign:1666691039 banker stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Program crash
Qakbot/Qbot
Malware Config
C2 Extraction:
181.164.194.228:443
24.116.45.121:443
190.74.248.136:443
24.206.27.39:443
27.110.134.202:995
2.88.206.121:443
71.199.168.185:443
200.233.108.153:995
198.2.51.242:993
172.117.139.142:995
70.115.104.126:443
144.202.15.58:443
190.24.45.24:995
24.9.220.167:443
58.247.115.126:995
193.3.19.137:443
45.230.169.132:995
68.62.199.70:443
43.241.159.238:443
113.162.196.232:443
156.217.60.239:995
197.204.70.167:443
201.68.209.47:32101
190.33.241.216:443
156.197.230.148:995
197.202.196.43:443
175.205.2.54:443
24.130.228.100:443
41.109.228.108:995
64.123.103.123:443
190.193.180.228:443
24.177.111.153:443
60.54.65.27:443
189.129.38.158:2222
206.1.164.250:443
190.36.189.34:993
173.49.74.62:443
41.99.110.44:443
190.203.51.133:2222
174.29.45.113:443
222.117.141.133:443
190.207.137.189:2222
208.78.220.120:443
105.111.81.57:443
105.158.78.171:443
24.207.97.117:443
88.240.75.201:443
105.154.214.130:995
41.104.155.245:443
41.98.242.254:443
196.70.146.120:443
90.165.109.4:2222
75.84.234.68:443
65.140.11.170:443
186.154.189.162:995
191.96.67.93:995
151.213.183.141:995
184.159.76.47:443
105.98.223.169:443
190.201.145.155:443
197.0.225.39:443
78.179.135.247:443
197.2.193.4:995
152.170.17.136:443
191.33.187.192:2222
41.101.193.38:443
105.156.0.235:995
98.207.190.55:443
41.47.249.185:443
186.18.210.16:443
196.207.146.151:443
118.174.207.134:995
47.14.229.4:443
41.234.116.241:993
190.37.112.223:2222
14.54.83.15:443
93.156.96.171:443
58.186.75.42:443
189.110.3.60:2222
167.58.254.85:443
186.18.77.99:443
41.107.78.169:443
102.159.194.141:443
149.126.159.224:443
201.208.58.92:2222
156.196.169.222:443
190.100.149.122:995
1.0.215.176:443
202.5.53.143:443
206.1.222.56:2087
102.156.162.83:443
220.134.54.185:2222
190.37.174.11:2222
176.241.48.177:443
190.29.228.61:443
41.101.183.90:443
94.36.5.31:443
102.184.30.42:443
102.187.63.127:995
190.33.87.140:443
187.198.16.39:443
62.46.231.64:443
42.116.54.220:443
197.244.204.128:443
190.203.106.109:2222
200.155.61.245:995
200.155.61.245:443
105.105.46.239:443
200.233.108.153:993
41.143.109.111:61202
91.171.72.214:32100
136.232.184.134:995
186.52.96.202:995
163.182.177.80:443
167.56.53.143:995
181.141.3.126:443
189.216.29.135:443
191.84.65.116:443
186.14.70.229:443
Unpacked files
SH256 hash:
5acf78b23c92c9cb65edd1245d19c81a1c600fba2a0f35bb4d0c279117de0889
MD5 hash:
8e5285fd750919d804823f03dff49b01
SHA1 hash:
1feaeb453f536fdf383a655d748dd14af422469d
SH256 hash:
4283149e4a13049014586fbdcd633f503b6f5535d222684e1e25d8aee38c3e8e
MD5 hash:
f43bdf31760bad4f1d4301808211524b
SHA1 hash:
dac4934dfa580271f045b7f5acd1e882bc0630f4
Detections:
Qakbot win_qakbot_auto
SH256 hash:
0ec25b0db6bd1466458d898121de430e110ff3bcb870afac634240de027ab43a
MD5 hash:
29e572000dd232365c4ce9566d220c9a
SHA1 hash:
e697100ecf834a599c95ec71d33c1f5e52b18b02
Please note that we are no longer able to provide a coverage score for Virus Total.

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Comments