MalwareBazaar Database
You are currently viewing the MalwareBazaar entry for SHA256 0ec25b0db6bd1466458d898121de430e110ff3bcb870afac634240de027ab43a. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.
Database Entry
Quakbot
Vendor detections: 11
| SHA256 hash: | 0ec25b0db6bd1466458d898121de430e110ff3bcb870afac634240de027ab43a |
|---|---|
| SHA3-384 hash: | ae1a503e1c96ebbf56fca98d40531ceb90a9c439da63ad1910854f9d9c239188fc5d856f4d70ea119dbea37a3740b51c |
| SHA1 hash: | e697100ecf834a599c95ec71d33c1f5e52b18b02 |
| MD5 hash: | 29e572000dd232365c4ce9566d220c9a |
| humanhash: | twenty-king-nevada-floor |
| File name: | competitive.dat |
| Download: | download sample |
| Signature | Quakbot |
| File size: | 745'472 bytes |
| First seen: | 2022-10-25 11:28:29 UTC |
| Last seen: | Never |
| File type: | |
| MIME type: | application/x-dosexec |
| imphash | d833407db486106e47f28b98cbd678b4 (2 x Quakbot) |
| ssdeep | 12288:9Zvx07iKfDISZYRobaZ0UrIBfUQ0eIFM4W+QnwldJOCP6HlD5:9ta1DjZBBAgdIM4K6dMCSHl |
| Threatray | 1'573 similar samples on MalwareBazaar |
| TLSH | T194F4AF32F1E8C433D1362AB89D3752A59C6BBD016D28AC4A6FE50F4D4F39A4136252F7 |
| TrID | 47.6% (.EXE) Win32 Executable Delphi generic (14182/79/4) 15.1% (.EXE) Win32 Executable (generic) (4505/5/1) 10.0% (.MZP) WinArchiver Mountable compressed Archive (3000/1) 6.9% (.EXE) Win16/32 Executable Delphi generic (2072/23) 6.8% (.EXE) OS/2 Executable (generic) (2029/13) |
| File icon (PE): | |
| dhash icon | 399998ecd4d46c0e (572 x Quakbot, 137 x ArkeiStealer, 82 x GCleaner) |
| Reporter | |
| Tags: | 1666691039 BB04 dll Qakbot Quakbot |
Intelligence
File Origin
# of uploads :
1
# of downloads :
229
Origin country :
n/a
Vendor Threat Intelligence
Detection:
QakBot
Result
Verdict:
Suspicious
Maliciousness:
Behaviour
Сreating synchronization primitives
Creating a window
Searching for synchronization primitives
Launching a process
Modifying an executable file
Unauthorized injection to a system process
Result
Verdict:
MALICIOUS
Details
Windows PE Executable
Found a Windows Portable Executable (PE) binary. Depending on context, the presence of a binary is suspicious or malicious.
Malware family:
Qakbot
Verdict:
Malicious
Threat name:
Win32.Backdoor.Quakbot
Status:
Malicious
First seen:
2022-10-25 12:10:16 UTC
File Type:
PE (Dll)
Extracted files:
38
AV detection:
20 of 26 (76.92%)
Threat level:
5/5
Detection(s):
Suspicious file
Verdict:
malicious
Label(s):
qakbot
Similar samples:
+ 1'563 additional samples on MalwareBazaar
Result
Malware family:
qakbot
Score:
10/10
Tags:
family:qakbot botnet:bb04 campaign:1666691039 banker stealer trojan
Behaviour
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Program crash
Qakbot/Qbot
Malware Config
C2 Extraction:
181.164.194.228:443
24.116.45.121:443
190.74.248.136:443
24.206.27.39:443
27.110.134.202:995
2.88.206.121:443
71.199.168.185:443
200.233.108.153:995
198.2.51.242:993
172.117.139.142:995
70.115.104.126:443
144.202.15.58:443
190.24.45.24:995
24.9.220.167:443
58.247.115.126:995
193.3.19.137:443
45.230.169.132:995
68.62.199.70:443
43.241.159.238:443
113.162.196.232:443
156.217.60.239:995
197.204.70.167:443
201.68.209.47:32101
190.33.241.216:443
156.197.230.148:995
197.202.196.43:443
175.205.2.54:443
24.130.228.100:443
41.109.228.108:995
64.123.103.123:443
190.193.180.228:443
24.177.111.153:443
60.54.65.27:443
189.129.38.158:2222
206.1.164.250:443
190.36.189.34:993
173.49.74.62:443
41.99.110.44:443
190.203.51.133:2222
174.29.45.113:443
222.117.141.133:443
190.207.137.189:2222
208.78.220.120:443
105.111.81.57:443
105.158.78.171:443
24.207.97.117:443
88.240.75.201:443
105.154.214.130:995
41.104.155.245:443
41.98.242.254:443
196.70.146.120:443
90.165.109.4:2222
75.84.234.68:443
65.140.11.170:443
186.154.189.162:995
191.96.67.93:995
151.213.183.141:995
184.159.76.47:443
105.98.223.169:443
190.201.145.155:443
197.0.225.39:443
78.179.135.247:443
197.2.193.4:995
152.170.17.136:443
191.33.187.192:2222
41.101.193.38:443
105.156.0.235:995
98.207.190.55:443
41.47.249.185:443
186.18.210.16:443
196.207.146.151:443
118.174.207.134:995
47.14.229.4:443
41.234.116.241:993
190.37.112.223:2222
14.54.83.15:443
93.156.96.171:443
58.186.75.42:443
189.110.3.60:2222
167.58.254.85:443
186.18.77.99:443
41.107.78.169:443
102.159.194.141:443
149.126.159.224:443
201.208.58.92:2222
156.196.169.222:443
190.100.149.122:995
1.0.215.176:443
202.5.53.143:443
206.1.222.56:2087
102.156.162.83:443
220.134.54.185:2222
190.37.174.11:2222
176.241.48.177:443
190.29.228.61:443
41.101.183.90:443
94.36.5.31:443
102.184.30.42:443
102.187.63.127:995
190.33.87.140:443
187.198.16.39:443
62.46.231.64:443
42.116.54.220:443
197.244.204.128:443
190.203.106.109:2222
200.155.61.245:995
200.155.61.245:443
105.105.46.239:443
200.233.108.153:993
41.143.109.111:61202
91.171.72.214:32100
136.232.184.134:995
186.52.96.202:995
163.182.177.80:443
167.56.53.143:995
181.141.3.126:443
189.216.29.135:443
191.84.65.116:443
186.14.70.229:443
24.116.45.121:443
190.74.248.136:443
24.206.27.39:443
27.110.134.202:995
2.88.206.121:443
71.199.168.185:443
200.233.108.153:995
198.2.51.242:993
172.117.139.142:995
70.115.104.126:443
144.202.15.58:443
190.24.45.24:995
24.9.220.167:443
58.247.115.126:995
193.3.19.137:443
45.230.169.132:995
68.62.199.70:443
43.241.159.238:443
113.162.196.232:443
156.217.60.239:995
197.204.70.167:443
201.68.209.47:32101
190.33.241.216:443
156.197.230.148:995
197.202.196.43:443
175.205.2.54:443
24.130.228.100:443
41.109.228.108:995
64.123.103.123:443
190.193.180.228:443
24.177.111.153:443
60.54.65.27:443
189.129.38.158:2222
206.1.164.250:443
190.36.189.34:993
173.49.74.62:443
41.99.110.44:443
190.203.51.133:2222
174.29.45.113:443
222.117.141.133:443
190.207.137.189:2222
208.78.220.120:443
105.111.81.57:443
105.158.78.171:443
24.207.97.117:443
88.240.75.201:443
105.154.214.130:995
41.104.155.245:443
41.98.242.254:443
196.70.146.120:443
90.165.109.4:2222
75.84.234.68:443
65.140.11.170:443
186.154.189.162:995
191.96.67.93:995
151.213.183.141:995
184.159.76.47:443
105.98.223.169:443
190.201.145.155:443
197.0.225.39:443
78.179.135.247:443
197.2.193.4:995
152.170.17.136:443
191.33.187.192:2222
41.101.193.38:443
105.156.0.235:995
98.207.190.55:443
41.47.249.185:443
186.18.210.16:443
196.207.146.151:443
118.174.207.134:995
47.14.229.4:443
41.234.116.241:993
190.37.112.223:2222
14.54.83.15:443
93.156.96.171:443
58.186.75.42:443
189.110.3.60:2222
167.58.254.85:443
186.18.77.99:443
41.107.78.169:443
102.159.194.141:443
149.126.159.224:443
201.208.58.92:2222
156.196.169.222:443
190.100.149.122:995
1.0.215.176:443
202.5.53.143:443
206.1.222.56:2087
102.156.162.83:443
220.134.54.185:2222
190.37.174.11:2222
176.241.48.177:443
190.29.228.61:443
41.101.183.90:443
94.36.5.31:443
102.184.30.42:443
102.187.63.127:995
190.33.87.140:443
187.198.16.39:443
62.46.231.64:443
42.116.54.220:443
197.244.204.128:443
190.203.106.109:2222
200.155.61.245:995
200.155.61.245:443
105.105.46.239:443
200.233.108.153:993
41.143.109.111:61202
91.171.72.214:32100
136.232.184.134:995
186.52.96.202:995
163.182.177.80:443
167.56.53.143:995
181.141.3.126:443
189.216.29.135:443
191.84.65.116:443
186.14.70.229:443
Unpacked files
SH256 hash:
5acf78b23c92c9cb65edd1245d19c81a1c600fba2a0f35bb4d0c279117de0889
MD5 hash:
8e5285fd750919d804823f03dff49b01
SHA1 hash:
1feaeb453f536fdf383a655d748dd14af422469d
SH256 hash:
4283149e4a13049014586fbdcd633f503b6f5535d222684e1e25d8aee38c3e8e
MD5 hash:
f43bdf31760bad4f1d4301808211524b
SHA1 hash:
dac4934dfa580271f045b7f5acd1e882bc0630f4
Detections:
Qakbot
win_qakbot_auto
SH256 hash:
0ec25b0db6bd1466458d898121de430e110ff3bcb870afac634240de027ab43a
MD5 hash:
29e572000dd232365c4ce9566d220c9a
SHA1 hash:
e697100ecf834a599c95ec71d33c1f5e52b18b02
Please note that we are no longer able to provide a coverage score for Virus Total.
Threat name:
Malicious File
Score:
1.00
File information
The table below shows additional information about this malware sample such as delivery method and external references.
Comments
Login required
You need to login to in order to write a comment. Login with your abuse.ch account.