MalwareBazaar Database

You are currently viewing the MalwareBazaar entry for SHA256 15c1feb12ecedafc233ebec6e0893ed0294f91ad48da9cc89c571ce3e316980d. While MalwareBazaar tries to identify whether the sample provided is malicious or not, there is no guarantee that a sample in MalwareBazaar is malicious.

Database Entry



Quakbot


Vendor detections: 4


Intelligence 4 IOCs YARA 3 File information Comments

SHA256 hash: 15c1feb12ecedafc233ebec6e0893ed0294f91ad48da9cc89c571ce3e316980d
SHA3-384 hash: 0f7952fd8daa7c47ee267457c767c831e7b311b64ea56079fc69df78184ecd8ae31909cd6e4408909a5f14d34a558cf0
SHA1 hash: 6dd83ad189bc69d5ecfaf6a6dd7fa6da62040237
MD5 hash: 8df359a70f4f189706110e65cc44388d
humanhash: high-twelve-nineteen-glucose
File name:LG48.zip
Download: download sample
Signature Quakbot
File size:405'866 bytes
First seen:2022-12-05 14:54:25 UTC
Last seen:Never
File type: zip
MIME type:application/zip
Note:This file is a password protected archive. The password is: N54
ssdeep 6144:cZZFT/1M6gWSPAynsemArNNWNrbGxh5Ysy/mhuRAxxqvE8HY1SKiEZhQKAIT4i:me6gv3sXArN0OxD0/m0aHqsjl/QUki
TLSH T1EE84232740A84A41CFFEDD3FEDADD78D9B12529341F608EA7283257A1394E5C0F86E85
TrID 80.0% (.ZIP) ZIP compressed archive (4000/1)
20.0% (.PG/BIN) PrintFox/Pagefox bitmap (640x800) (1000/1)
Reporter pr0xylife
Tags:1670238005 BB09 pw-N54 Qakbot Quakbot zip

Intelligence


File Origin
# of uploads :
1
# of downloads :
163
Origin country :
RU RU
File Archive Information

This file archive contains 6 file(s), sorted by their relevance:

File name:combusting.txt
File size:178'193 bytes
SHA256 hash: dd5a42dadedf24c8f479f6ce4dc235c72d4f5c2e16cfec5176db4da8cce48875
MD5 hash: 887b66d75ad2b274a8ab422803b45f34
MIME type:text/plain
Signature Quakbot
File name:dispersers.cmd
File size:291 bytes
SHA256 hash: feb1857e7ce32fbee82dfa8a0f4d53deed9a7ea841122cd4a8c84c5d43c61439
MD5 hash: 0113de80cf8c28384998b91527148ca4
MIME type:text/plain
Signature Quakbot
File name:WPSettings.dat
File size:12 bytes
SHA256 hash: d245ccd65234d749307dc0d2bda7048609e9fc8149e8ef6c6ec1db437de569b4
MD5 hash: 9ab184c60615063a9c7b509431dc7d6d
MIME type:application/octet-stream
Signature Quakbot
File name:erect.tmp
File size:683'520 bytes
SHA256 hash: c6887e515b36694e8e738c0df7610014e084bcce80ee13c998087471daf039a4
MD5 hash: e8d95feadab525fb0d43b040a02e05ab
MIME type:application/x-dosexec
Signature Quakbot
File name:pests.cmd
File size:225 bytes
SHA256 hash: 1f4a42651773cbef4b463ea466b760b1fafa24eaa629743152090e9f102884c4
MD5 hash: 54a0471de5cf99c55984b4574f580c6c
MIME type:text/plain
Signature Quakbot
File name:HG.lnk
File size:1'715 bytes
SHA256 hash: 36a24720c23d86511b2855440082c28f695e12f55327efef3e97142cfe80a54c
MD5 hash: fbb437f912ab97ae5f0fdc6cc76c8fef
MIME type:application/octet-stream
Signature Quakbot
Vendor Threat Intelligence
Gathering data
Threat name:
Binary.Trojan.Generic
Status:
Suspicious
First seen:
2022-12-05 14:55:07 UTC
File Type:
Binary (Archive)
AV detection:
3 of 41 (7.32%)
Threat level:
  5/5
Result
Malware family:
Score:
  10/10
Tags:
family:qakbot botnet:bb09 campaign:1670238005 banker stealer trojan
Behaviour
Suspicious behavior: CmdExeWriteProcessMemorySpam
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: MapViewOfSection
Suspicious use of WriteProcessMemory
Enumerates physical storage devices
Checks computer location settings
Qakbot/Qbot
Malware Config
C2 Extraction:
76.100.159.250:443
66.191.69.18:995
186.64.67.9:443
50.90.249.161:443
109.150.179.158:2222
92.149.205.238:2222
86.165.15.180:2222
41.44.19.36:995
78.17.157.5:443
173.18.126.3:443
75.99.125.235:2222
172.90.139.138:2222
27.99.45.237:2222
91.68.227.219:443
12.172.173.82:993
103.144.201.62:2078
12.172.173.82:990
173.239.94.212:443
91.169.12.198:32100
24.64.114.59:2222
74.66.134.24:443
93.164.248.234:443
83.92.85.93:443
78.69.251.252:2222
190.134.138.61:443
2.99.47.198:2222
73.223.248.31:443
12.172.173.82:995
94.63.65.146:443
80.13.179.151:2222
70.120.228.205:2083
216.196.245.102:2078
31.167.254.199:995
89.129.109.27:2222
69.119.123.159:2222
91.254.230.18:443
64.121.161.102:443
38.166.242.12:2087
12.172.173.82:465
75.143.236.149:443
81.229.117.95:2222
74.92.243.113:50000
183.82.100.110:2222
75.98.154.19:443
193.154.202.210:443
121.122.99.223:995
70.115.104.126:995
213.67.255.57:2222
213.91.235.146:443
37.14.229.220:2222
76.80.180.154:995
62.31.130.138:465
89.115.196.99:443
2.83.12.243:443
85.152.152.46:443
188.48.123.229:995
90.104.22.28:2222
201.210.107.223:993
47.41.154.250:443
50.68.204.71:995
84.215.202.22:443
85.241.180.94:443
92.189.214.236:2222
103.55.67.180:443
90.89.95.158:2222
86.217.250.15:2222
72.68.175.55:2222
86.190.16.164:443
136.244.25.165:443
65.30.139.145:995
73.161.176.218:443
199.83.165.233:443
98.145.23.67:443
84.35.26.14:995
24.64.114.59:3389
50.68.204.71:443
102.46.139.82:993
71.247.10.63:995
149.126.159.106:443
58.162.223.233:443
216.196.245.102:2083
184.155.91.69:443
87.99.116.47:443
81.131.210.167:443
103.141.50.117:995
184.176.154.83:995
92.207.132.174:2222
142.161.27.232:2222
176.142.207.63:443
184.153.132.82:443
108.6.249.139:443
69.133.162.35:443
76.20.42.45:443
139.216.164.122:443
24.206.27.39:443
12.172.173.82:21
77.86.98.236:443
50.68.204.71:993
88.126.94.4:50000
85.245.221.87:2078
190.206.70.80:2222
87.221.197.110:2222
83.7.54.186:443
87.223.91.46:443
78.100.230.10:995
181.164.194.228:443
174.101.111.4:443
75.115.14.189:443
86.225.214.138:2222
58.247.115.126:995
86.96.75.237:2222
105.103.56.28:2078
198.2.51.242:993
174.104.184.149:443
105.103.56.28:990
24.64.114.59:61202
93.24.192.142:20
2.14.82.210:2222
90.116.219.167:2222
Please note that we are no longer able to provide a coverage score for Virus Total.

YARA Signatures


MalwareBazaar uses YARA rules from several public and non-public repositories, such as YARAhub and Malpedia. Those are being matched against malware samples uploaded to MalwareBazaar as well as against any suspicious process dumps they may create. Please note that only results from TLP:CLEAR rules are being displayed.

Rule name:cobalt_strike_tmp01925d3f
Author:The DFIR Report
Description:files - file ~tmp01925d3f.exe
Reference:https://thedfirreport.com
Rule name:Disable_Defender
Author:iam-py-test
Description:Detect files disabling or modifying Windows Defender, Windows Firewall, or Microsoft Smartscreen
Rule name:PassProtected_ZIP_ISO_file
Author:_jc
Description:Detects container formats commonly smuggled through password-protected zips

File information


The table below shows additional information about this malware sample such as delivery method and external references.

Web download

Quakbot

zip 15c1feb12ecedafc233ebec6e0893ed0294f91ad48da9cc89c571ce3e316980d

(this sample)

  
Delivery method
Distributed via web download

Comments